SUSE update for the Linux Kernel



| Updated: 2024-12-04
Risk High
Patch available YES
Number of vulnerabilities 310
CVE-ID CVE-2021-47086
CVE-2021-47103
CVE-2021-47186
CVE-2021-47402
CVE-2021-47546
CVE-2021-47547
CVE-2021-47588
CVE-2021-47590
CVE-2021-47591
CVE-2021-47593
CVE-2021-47598
CVE-2021-47599
CVE-2021-47606
CVE-2021-47622
CVE-2021-47623
CVE-2021-47624
CVE-2022-48713
CVE-2022-48730
CVE-2022-48732
CVE-2022-48749
CVE-2022-48756
CVE-2022-48773
CVE-2022-48774
CVE-2022-48775
CVE-2022-48776
CVE-2022-48777
CVE-2022-48778
CVE-2022-48780
CVE-2022-48783
CVE-2022-48784
CVE-2022-48785
CVE-2022-48786
CVE-2022-48787
CVE-2022-48788
CVE-2022-48789
CVE-2022-48790
CVE-2022-48791
CVE-2022-48792
CVE-2022-48793
CVE-2022-48794
CVE-2022-48796
CVE-2022-48797
CVE-2022-48798
CVE-2022-48799
CVE-2022-48800
CVE-2022-48801
CVE-2022-48802
CVE-2022-48803
CVE-2022-48804
CVE-2022-48805
CVE-2022-48806
CVE-2022-48807
CVE-2022-48809
CVE-2022-48810
CVE-2022-48811
CVE-2022-48812
CVE-2022-48813
CVE-2022-48814
CVE-2022-48815
CVE-2022-48816
CVE-2022-48817
CVE-2022-48818
CVE-2022-48820
CVE-2022-48821
CVE-2022-48822
CVE-2022-48823
CVE-2022-48824
CVE-2022-48825
CVE-2022-48826
CVE-2022-48827
CVE-2022-48828
CVE-2022-48829
CVE-2022-48830
CVE-2022-48831
CVE-2022-48834
CVE-2022-48835
CVE-2022-48836
CVE-2022-48837
CVE-2022-48838
CVE-2022-48839
CVE-2022-48840
CVE-2022-48841
CVE-2022-48842
CVE-2022-48843
CVE-2022-48844
CVE-2022-48846
CVE-2022-48847
CVE-2022-48849
CVE-2022-48850
CVE-2022-48851
CVE-2022-48852
CVE-2022-48853
CVE-2022-48855
CVE-2022-48856
CVE-2022-48857
CVE-2022-48858
CVE-2022-48859
CVE-2022-48860
CVE-2022-48861
CVE-2022-48862
CVE-2022-48863
CVE-2022-48864
CVE-2022-48866
CVE-2023-1582
CVE-2023-37453
CVE-2023-52435
CVE-2023-52573
CVE-2023-52580
CVE-2023-52591
CVE-2023-52735
CVE-2023-52751
CVE-2023-52762
CVE-2023-52775
CVE-2023-52812
CVE-2023-52857
CVE-2023-52863
CVE-2023-52885
CVE-2023-52886
CVE-2024-25741
CVE-2024-26583
CVE-2024-26584
CVE-2024-26585
CVE-2024-26615
CVE-2024-26633
CVE-2024-26635
CVE-2024-26636
CVE-2024-26641
CVE-2024-26661
CVE-2024-26663
CVE-2024-26665
CVE-2024-26800
CVE-2024-26802
CVE-2024-26813
CVE-2024-26814
CVE-2024-26863
CVE-2024-26889
CVE-2024-26920
CVE-2024-26935
CVE-2024-26961
CVE-2024-26976
CVE-2024-27015
CVE-2024-27019
CVE-2024-27020
CVE-2024-27025
CVE-2024-27065
CVE-2024-27402
CVE-2024-27437
CVE-2024-35805
CVE-2024-35819
CVE-2024-35837
CVE-2024-35853
CVE-2024-35854
CVE-2024-35855
CVE-2024-35889
CVE-2024-35890
CVE-2024-35893
CVE-2024-35899
CVE-2024-35934
CVE-2024-35949
CVE-2024-35961
CVE-2024-35979
CVE-2024-35995
CVE-2024-36000
CVE-2024-36004
CVE-2024-36288
CVE-2024-36889
CVE-2024-36901
CVE-2024-36902
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36919
CVE-2024-36923
CVE-2024-36924
CVE-2024-36926
CVE-2024-36939
CVE-2024-36941
CVE-2024-36942
CVE-2024-36944
CVE-2024-36946
CVE-2024-36947
CVE-2024-36950
CVE-2024-36952
CVE-2024-36955
CVE-2024-36959
CVE-2024-36974
CVE-2024-38548
CVE-2024-38555
CVE-2024-38558
CVE-2024-38559
CVE-2024-38570
CVE-2024-38586
CVE-2024-38588
CVE-2024-38598
CVE-2024-38628
CVE-2024-39276
CVE-2024-39371
CVE-2024-39463
CVE-2024-39472
CVE-2024-39475
CVE-2024-39482
CVE-2024-39487
CVE-2024-39488
CVE-2024-39490
CVE-2024-39493
CVE-2024-39494
CVE-2024-39497
CVE-2024-39499
CVE-2024-39500
CVE-2024-39501
CVE-2024-39502
CVE-2024-39505
CVE-2024-39506
CVE-2024-39507
CVE-2024-39508
CVE-2024-39509
CVE-2024-40900
CVE-2024-40901
CVE-2024-40902
CVE-2024-40903
CVE-2024-40904
CVE-2024-40906
CVE-2024-40908
CVE-2024-40909
CVE-2024-40911
CVE-2024-40912
CVE-2024-40916
CVE-2024-40919
CVE-2024-40923
CVE-2024-40924
CVE-2024-40927
CVE-2024-40929
CVE-2024-40931
CVE-2024-40932
CVE-2024-40934
CVE-2024-40935
CVE-2024-40937
CVE-2024-40940
CVE-2024-40941
CVE-2024-40942
CVE-2024-40943
CVE-2024-40945
CVE-2024-40953
CVE-2024-40954
CVE-2024-40956
CVE-2024-40958
CVE-2024-40959
CVE-2024-40960
CVE-2024-40961
CVE-2024-40966
CVE-2024-40967
CVE-2024-40970
CVE-2024-40972
CVE-2024-40976
CVE-2024-40977
CVE-2024-40981
CVE-2024-40982
CVE-2024-40984
CVE-2024-40987
CVE-2024-40988
CVE-2024-40989
CVE-2024-40990
CVE-2024-40994
CVE-2024-40998
CVE-2024-40999
CVE-2024-41002
CVE-2024-41004
CVE-2024-41006
CVE-2024-41009
CVE-2024-41011
CVE-2024-41012
CVE-2024-41013
CVE-2024-41014
CVE-2024-41015
CVE-2024-41016
CVE-2024-41017
CVE-2024-41040
CVE-2024-41041
CVE-2024-41044
CVE-2024-41048
CVE-2024-41057
CVE-2024-41058
CVE-2024-41059
CVE-2024-41063
CVE-2024-41064
CVE-2024-41066
CVE-2024-41069
CVE-2024-41070
CVE-2024-41071
CVE-2024-41072
CVE-2024-41076
CVE-2024-41078
CVE-2024-41081
CVE-2024-41087
CVE-2024-41090
CVE-2024-41091
CVE-2024-42070
CVE-2024-42079
CVE-2024-42093
CVE-2024-42096
CVE-2024-42105
CVE-2024-42122
CVE-2024-42124
CVE-2024-42145
CVE-2024-42161
CVE-2024-42224
CVE-2024-42230
CWE-ID CWE-371
CWE-416
CWE-476
CWE-401
CWE-125
CWE-191
CWE-667
CWE-415
CWE-399
CWE-193
CWE-388
CWE-835
CWE-119
CWE-20
CWE-682
CWE-190
CWE-908
CWE-362
CWE-617
CWE-824
CWE-200
CWE-366
CWE-369
CWE-843
Exploitation vector Network
Public exploit N/A
Vulnerable software
openSUSE Leap Micro
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

SUSE Real Time Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

kernel-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

kernel-livepatch-5_14_21-150500_13_64-rt
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

kernel-rt_debug-livepatch-devel
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 310 vulnerabilities.

1) State Issues

EUVDB-ID: #VU89260

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47086

CWE-ID: CWE-371 - State Issues

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect handling of the socket state within the pep_ioctl() function in net/phonet/pep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU90232

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2021-47103

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a use-after-free error within the inet6_sk_rx_dst_set(), tcp_v6_do_rcv() and tcp_v6_early_demux() functions in net/ipv6/tcp_ipv6.c, within the udp_sk_rx_dst_set(), __udp4_lib_rcv() and udp_v4_early_demux() functions in net/ipv4/udp.c, within the tcp_v4_do_rcv(), tcp_v4_early_demux(), tcp_prequeue() and inet_sk_rx_dst_set() functions in net/ipv4/tcp_ipv4.c, within the tcp_rcv_established() function in net/ipv4/tcp_input.c, within the tcp_disconnect() function in net/ipv4/tcp.c, within the inet_sock_destruct() function in net/ipv4/af_inet.c. A local user can send specially crafted packets to the system, trigger a use-after-free error and potentially execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU90581

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47186

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tipc_aead_init() function in net/tipc/crypto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free

EUVDB-ID: #VU90142

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47402

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fl_walk() function in net/sched/cls_flower.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU89931

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-47546

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within fib6_rule_suppress() function in net/ipv4/fib_rules.c. A remote attacker can send IPv6 packets to the system, trigger memory leak and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU91080

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47547

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mii_get_phy() function in drivers/net/ethernet/dec/tulip/de4x5.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Integer underflow

EUVDB-ID: #VU92374

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47588

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the sit_init_net() function in net/ipv6/sit.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper locking

EUVDB-ID: #VU92354

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47590

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __mptcp_push_pending() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU92333

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47591

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mptcp_supported_sockopt() function in net/mptcp/sockopt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) NULL pointer dereference

EUVDB-ID: #VU92335

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47593

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mptcp_accept() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU92302

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47598

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cake_init() function in net/sched/sch_cake.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Double free

EUVDB-ID: #VU93763

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47599

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the btrfs_unfreeze() function in fs/btrfs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper locking

EUVDB-ID: #VU92356

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47606

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the netlink_sendmsg() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Improper locking

EUVDB-ID: #VU94457

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47622

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the EXPORT_SYMBOL_GPL(), ufshcd_hba_capabilities(), ufshcd_wait_for_dev_cmd(), ufshcd_exec_dev_cmd(), ufshcd_issue_devman_upiu_cmd() and ufshcd_init() functions in drivers/scsi/ufs/ufshcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Resource management error

EUVDB-ID: #VU94487

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47623

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the set_pte_at() function in arch/powerpc/mm/pgtable.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Memory leak

EUVDB-ID: #VU94401

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47624

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the rpc_sysfs_xprt_state_change() function in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) NULL pointer dereference

EUVDB-ID: #VU92920

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48713

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pt_handle_status() function in arch/x86/events/intel/pt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory leak

EUVDB-ID: #VU92882

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48730

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dma_heap_ioctl() function in drivers/dma-buf/dma-heap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Off-by-one

EUVDB-ID: #VU92927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48732

CWE-ID: CWE-193 - Off-by-one Error

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an off-by-one error within the nvbios_addr() function in drivers/gpu/drm/nouveau/nvkm/subdev/bios/base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) NULL pointer dereference

EUVDB-ID: #VU92912

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48749

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dpu_setup_dspp_pcc() function in drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) NULL pointer dereference

EUVDB-ID: #VU92915

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48756

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the msm_dsi_phy_driver_unregister() function in drivers/gpu/drm/msm/dsi/phy/dsi_phy.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) NULL pointer dereference

EUVDB-ID: #VU94439

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48773

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rpcrdma_ep_create() function in net/sunrpc/xprtrdma/verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Memory leak

EUVDB-ID: #VU94409

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48774

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pt_core_init() function in drivers/dma/ptdma/ptdma-dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Memory leak

EUVDB-ID: #VU94408

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48775

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vmbus_add_channel_kobj() function in drivers/hv/vmbus_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Memory leak

EUVDB-ID: #VU94491

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48776

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the parse_qcomsmem_cleanup() function in drivers/mtd/parsers/qcomsmempart.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper error handling

EUVDB-ID: #VU94459

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48777

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the parse_qcomsmem_part() function in drivers/mtd/parsers/qcomsmempart.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Memory leak

EUVDB-ID: #VU94407

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48778

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gpmi_nfc_exec_op() and pm_runtime_mark_last_busy() functions in drivers/mtd/nand/raw/gpmi-nand/gpmi-nand.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Infinite loop

EUVDB-ID: #VU94470

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48780

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the smc_fback_error_report() and smc_switch_to_fallback() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Use-after-free

EUVDB-ID: #VU94426

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48783

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gswip_remove() function in drivers/net/dsa/lantiq_gswip.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Improper locking

EUVDB-ID: #VU94449

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48784

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cfg80211_event_work() function in net/wireless/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Improper locking

EUVDB-ID: #VU94456

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48785

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mld_newpack() function in net/ipv6/mcast.c, within the EXPORT_SYMBOL() function in net/ipv6/addrconf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Improper locking

EUVDB-ID: #VU94455

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48786

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vsock_stream_connect() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Use-after-free

EUVDB-ID: #VU94425

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48787

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the iwl_req_fw_callback() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Use-after-free

EUVDB-ID: #VU94424

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48788

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nvme_rdma_error_recovery_work() function in drivers/nvme/host/rdma.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Use-after-free

EUVDB-ID: #VU94423

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48789

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nvme_tcp_error_recovery_work() function in drivers/nvme/host/tcp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Use-after-free

EUVDB-ID: #VU94422

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48790

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nvme_async_event_work() function in drivers/nvme/host/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Use-after-free

EUVDB-ID: #VU94421

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48791

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pm8001_exec_internal_tmf_task() function in drivers/scsi/pm8001/pm8001_sas.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Use-after-free

EUVDB-ID: #VU94420

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48792

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mpi_ssp_completion() and mpi_sata_completion() functions in drivers/scsi/pm8001/pm80xx_hwi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) NULL pointer dereference

EUVDB-ID: #VU94441

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48793

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the svm_set_nested_state() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Memory leak

EUVDB-ID: #VU94406

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48794

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the at86rf230_async_error_recover_complete() and at86rf230_async_error_recover() functions in drivers/net/ieee802154/at86rf230.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use-after-free

EUVDB-ID: #VU94419

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48796

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the dev_iommu_get() function in drivers/iommu/iommu.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Buffer overflow

EUVDB-ID: #VU94477

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48797

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the change_pte_range() function in mm/mprotect.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Input validation error

EUVDB-ID: #VU94490

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48798

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the io_subchannel_chp_event() function in drivers/s390/cio/device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Buffer overflow

EUVDB-ID: #VU94478

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48799

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the DEFINE_PER_CPU() and perf_cgroup_switch() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Improper locking

EUVDB-ID: #VU94454

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48800

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the reclaim_throttle() function in mm/vmscan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Use-after-free

EUVDB-ID: #VU94416

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48801

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the iio_device_buffer_getfd() function in drivers/iio/industrialio-buffer.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Improper error handling

EUVDB-ID: #VU94460

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48802

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the smaps_page_accumulate(), smaps_account(), smaps_pte_entry(), smaps_pmd_entry(), pte_to_pagemap_entry() and pagemap_pmd_range() functions in fs/proc/task_mmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Out-of-bounds read

EUVDB-ID: #VU94430

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48803

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drivers/phy/ti/phy-j721e-wiz.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Out-of-bounds read

EUVDB-ID: #VU94431

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48804

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vt_ioctl() function in drivers/tty/vt/vt_ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Out-of-bounds read

EUVDB-ID: #VU94432

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48805

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ax88179_rx_fixup() function in drivers/net/usb/ax88179_178a.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Buffer overflow

EUVDB-ID: #VU94467

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48806

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ee1004_eeprom_read() function in drivers/misc/eeprom/ee1004.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Out-of-bounds read

EUVDB-ID: #VU94433

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48807

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ice_lag_unlink() and ice_lag_event_handler() functions in drivers/net/ethernet/intel/ice/ice_lag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Memory leak

EUVDB-ID: #VU94405

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48809

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the include/net/dst_metadata.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Improper locking

EUVDB-ID: #VU94453

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48810

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ip6mr_rules_init() function in net/ipv6/ip6mr.c, within the ipmr_rules_init() function in net/ipv4/ipmr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) NULL pointer dereference

EUVDB-ID: #VU94444

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48811

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the init_crq_queue(), __ibmvnic_open() and ibmvnic_open() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Resource management error

EUVDB-ID: #VU94476

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48812

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the gswip_mdio_rd(), gswip_mdio(), gswip_mdio_mask() and gswip_remove() functions in drivers/net/dsa/lantiq_gswip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Resource management error

EUVDB-ID: #VU94475

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48813

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vsc9959_mdio_bus_alloc() and vsc9959_mdio_bus_free() functions in drivers/net/dsa/ocelot/felix_vsc9959.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Resource management error

EUVDB-ID: #VU94474

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48814

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vsc9953_mdio_bus_alloc() and vsc9953_mdio_bus_free() functions in drivers/net/dsa/ocelot/seville_vsc9953.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Resource management error

EUVDB-ID: #VU94471

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48815

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bcm_sf2_mdio_register() function in drivers/net/dsa/bcm_sf2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Improper locking

EUVDB-ID: #VU94452

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48816

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the xs_get_srcport() function in net/sunrpc/xprtsock.c, within the rpc_sysfs_xprt_srcaddr_show() function in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Resource management error

EUVDB-ID: #VU94473

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48817

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ar9331_sw_mbus_init() and ar9331_sw_remove() functions in drivers/net/dsa/qca/ar9331.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Improper error handling

EUVDB-ID: #VU94461

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48818

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mv88e6xxx_mdio_register() and mv88e6xxx_mdios_unregister() functions in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Memory leak

EUVDB-ID: #VU94404

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48820

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the stm32_usbphyc_pll_enable() function in drivers/phy/st/phy-stm32-usbphyc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Use-after-free

EUVDB-ID: #VU94417

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48821

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fastrpc_dmabuf_alloc() function in drivers/misc/fastrpc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Memory leak

EUVDB-ID: #VU94403

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48822

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ffs_data_put(), ffs_data_new(), ffs_epfiles_destroy() and ffs_func_eps_disable() functions in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Incorrect calculation

EUVDB-ID: #VU94488

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48823

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the qedf_initiate_cleanup() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) NULL pointer dereference

EUVDB-ID: #VU94445

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48824

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the myrs_cleanup() function in drivers/scsi/myrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Resource management error

EUVDB-ID: #VU94485

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48825

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the qedf_vport_create() function in drivers/scsi/qedf/qedf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Improper locking

EUVDB-ID: #VU94451

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48826

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vc4_dsi_host_attach() and vc4_dsi_dev_remove() functions in drivers/gpu/drm/vc4/vc4_dsi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Buffer overflow

EUVDB-ID: #VU94479

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48827

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nfsd4_encode_read() and nfsd4_encode_read_plus() functions in fs/nfsd/nfs4xdr.c, within the nfsd4_read() function in fs/nfsd/nfs4proc.c, within the nfsd3_proc_read() function in fs/nfsd/nfs3proc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Integer underflow

EUVDB-ID: #VU94466

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48828

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the nfsd_setattr() function in fs/nfsd/vfs.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Input validation error

EUVDB-ID: #VU94492

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48829

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the svcxdr_decode_sattr3() function in fs/nfsd/nfs3xdr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Improper locking

EUVDB-ID: #VU94450

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48830

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the LIST_HEAD(), isotp_rcv() and isotp_init() functions in net/can/isotp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Memory leak

EUVDB-ID: #VU94402

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48831

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the asymmetric_verify() function in security/integrity/digsig_asymmetric.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Resource management error

EUVDB-ID: #VU94481

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48834

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the usbtmc_ioctl_request() function in drivers/usb/class/usbtmc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Improper locking

EUVDB-ID: #VU94448

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48835

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mpt3sas_base_sync_reply_irqs() function in drivers/scsi/mpt3sas/mpt3sas_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Improper locking

EUVDB-ID: #VU94447

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48836

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the aiptek_probe() function in drivers/input/tablet/aiptek.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Integer overflow

EUVDB-ID: #VU94465

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48837

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the rndis_set_response() function in drivers/usb/gadget/function/rndis.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Use-after-free

EUVDB-ID: #VU94415

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48838

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb_gadget_remove_driver(), udc_bind_to_driver() and dev_err() functions in drivers/usb/gadget/udc/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Memory leak

EUVDB-ID: #VU94392

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48839

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tpacket_rcv() and packet_recvmsg() functions in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Use of uninitialized resource

EUVDB-ID: #VU94463

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48840

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the iavf_remove() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) NULL pointer dereference

EUVDB-ID: #VU94435

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48841

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ice_update_vsi_tx_ring_stats() function in drivers/net/ethernet/intel/ice/ice_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Improper locking

EUVDB-ID: #VU94446

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48842

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ice_service_task() function in drivers/net/ethernet/intel/ice/ice_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) NULL pointer dereference

EUVDB-ID: #VU94436

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48843

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL() function in drivers/gpu/drm/drm_connector.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Memory leak

EUVDB-ID: #VU94400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48844

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the hci_release_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Memory leak

EUVDB-ID: #VU94399

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48846

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the blk_cleanup_queue() function in block/blk-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Out-of-bounds read

EUVDB-ID: #VU94428

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48847

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the watch_queue_set_filter() function in kernel/watch_queue.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Resource management error

EUVDB-ID: #VU94484

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48849

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the amdgpu_display_framebuffer_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_display.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) NULL pointer dereference

EUVDB-ID: #VU94437

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48850

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the speed_show() function in net/core/net-sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Use-after-free

EUVDB-ID: #VU94414

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48851

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tx_complete() function in drivers/staging/gdm724x/gdm_lte.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Memory leak

EUVDB-ID: #VU94398

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48852

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vc4_hdmi_audio_init() and vc4_hdmi_unbind() functions in drivers/gpu/drm/vc4/vc4_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Memory leak

EUVDB-ID: #VU94397

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48853

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the Documentation/DMA-attributes.txt, include/linux/dma-mapping.h, lib/swiotlb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Use of uninitialized resource

EUVDB-ID: #VU94464

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48855

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the inet_diag_msg_sctpasoc_fill() and inet_sctp_diag_fill() functions in net/sctp/sctp_diag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Memory leak

EUVDB-ID: #VU94396

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48856

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gfar_get_ts_info() function in drivers/net/ethernet/freescale/gianfar_ethtool.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Use-after-free

EUVDB-ID: #VU94412

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48857

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nfc_digital_free_device() function in drivers/nfc/port100.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Use-after-free

EUVDB-ID: #VU94411

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48858

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cmd_alloc_index() and cmd_ent_get() functions in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Memory leak

EUVDB-ID: #VU94395

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48859

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the prestera_switch_set_base_mac_addr() function in drivers/net/ethernet/marvell/prestera/prestera_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Memory leak

EUVDB-ID: #VU94394

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48860

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xemaclite_of_probe() function in drivers/net/ethernet/xilinx/xilinx_emaclite.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Use-after-free

EUVDB-ID: #VU94410

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48861

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vp_vdpa_remove() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Infinite loop

EUVDB-ID: #VU94469

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48862

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the vhost_chr_write_iter() function in drivers/vhost/vhost.c, within the vhost_iotlb_add_range_ctx() function in drivers/vhost/iotlb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Memory leak

EUVDB-ID: #VU94393

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48863

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dsp_pipeline_destroy() and dsp_pipeline_build() functions in drivers/isdn/mISDN/dsp_pipeline.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Input validation error

EUVDB-ID: #VU94458

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48864

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the handle_ctrl_mq() function in drivers/vdpa/mlx5/net/mlx5_vnet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Out-of-bounds read

EUVDB-ID: #VU94429

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48866

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the thrustmaster_interrupts() function in drivers/hid/hid-thrustmaster.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Race condition

EUVDB-ID: #VU74629

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-1582

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within fs/proc/task_mmu.c. A local user can exploit the race and crash the kernel.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Out-of-bounds read

EUVDB-ID: #VU80795

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-37453

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the read_descriptors() function in drivers/usb/core/sysfs.c. An attacker with physical access to the system can attach a malicious USB device, trigger an out-of-bounds read error and crash the kernel.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Buffer overflow

EUVDB-ID: #VU87748

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52435

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the skb_segment() function. A local user can trigger memory corruption and crash the kernel.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) NULL pointer dereference

EUVDB-ID: #VU90842

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52573

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rds_rdma_cm_event_handler_cmn() function in net/rds/rdma_transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Reachable Assertion

EUVDB-ID: #VU89383

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-52580

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in net/core/flow_dissector.c. A remote attacker on the local network can send specially crafted PTP ethernet frames to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Improper locking

EUVDB-ID: #VU91538

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52591

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the reiserfs_rename() function in fs/reiserfs/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Memory leak

EUVDB-ID: #VU91621

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52735

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sock_map_unhash(), sock_map_destroy() and sock_map_close() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Use-after-free

EUVDB-ID: #VU90063

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52751

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the find_or_create_cached_dir(), spin_unlock() and open_cached_dir() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Buffer overflow

EUVDB-ID: #VU93622

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52762

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the virtblk_probe() function in drivers/block/virtio_blk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Buffer overflow

EUVDB-ID: #VU93425

Risk: Medium

CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-52775

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the smcr_clnt_conf_first_link() function in net/smc/af_smc.c when handling SMC DECLINE messages. A remote attacker can send specially crafted SMC DECLINE message to the system, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Out-of-bounds read

EUVDB-ID: #VU91085

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52812

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the smu_v13_0_update_pcie_parameters() function in drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Integer overflow

EUVDB-ID: #VU91178

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52857

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the mtk_plane_update_new_state() function in drivers/gpu/drm/mediatek/mtk_drm_plane.c, within the mtk_drm_gem_dumb_create() function in drivers/gpu/drm/mediatek/mtk_drm_gem.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) NULL pointer dereference

EUVDB-ID: #VU90426

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52863

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the axi_fan_control_probe() function in drivers/hwmon/axi-fan-control.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Use-after-free

EUVDB-ID: #VU94326

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52885

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the svc_tcp_listen_data_ready() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Out-of-bounds read

EUVDB-ID: #VU94434

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52886

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the get_bMaxPacketSize0(), hub_port_init(), hub_port_connect() and usb_reset_and_verify_device() functions in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Resource management error

EUVDB-ID: #VU94364

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-25741

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the printer_write() in drivers/usb/gadget/function/f_printer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Race condition

EUVDB-ID: #VU87596

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-26583

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition between async notify and socket close in TLS implementation in net/tls/tls_sw.c. A remote attacker can send specially crafted traffic to the system, trigger a race condition and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Error handling

EUVDB-ID: #VU89001

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-26584

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error when handling backlogging of crypto requests in net/tls/tls_sw.c. A remote attacker can send specially crafted traffic to the system and perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Race condition

EUVDB-ID: #VU89251

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-26585

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the tls_encrypt_done() function in net/tls/tls_sw.c. A remote attacker user can send specially crafted requests to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) NULL pointer dereference

EUVDB-ID: #VU90627

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26615

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __smc_diag_dump() function in net/smc/smc_diag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Input validation error

EUVDB-ID: #VU89267

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-26633

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in NEXTHDR_FRAGMENT handling within the ip6_tnl_parse_tlv_enc_lim() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Use of uninitialized resource

EUVDB-ID: #VU90880

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26635

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the cpu_to_be16() function in net/llc/llc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Input validation error

EUVDB-ID: #VU90859

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26636

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the llc_ui_sendmsg() function in net/llc/af_llc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Access of Uninitialized Pointer

EUVDB-ID: #VU89396

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-26641

CWE-ID: CWE-824 - Access of Uninitialized Pointer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Resource management error

EUVDB-ID: #VU93260

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26661

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dcn21_set_abm_immediate_disable() function in drivers/gpu/drm/amd/display/dc/dcn21/dcn21_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) NULL pointer dereference

EUVDB-ID: #VU92073

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26663

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tipc_nl_bearer_add() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Out-of-bounds read

EUVDB-ID: #VU90336

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26665

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iptunnel_pmtud_build_icmpv6() function in net/ipv4/ip_tunnel_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Use-after-free

EUVDB-ID: #VU90210

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26800

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the struct_group(), tls_do_decryption() and tls_decrypt_sg() functions in net/tls/tls_sw.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) NULL pointer dereference

EUVDB-ID: #VU90589

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26802

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the stmmac_fpe_stop_wq() function in drivers/net/ethernet/stmicro/stmmac/stmmac_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) NULL pointer dereference

EUVDB-ID: #VU90588

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26813

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vfio_platform_set_irq_unmask(), vfio_automasked_irq_handler(), vfio_irq_handler(), vfio_set_trigger(), vfio_platform_set_irq_trigger(), vfio_platform_set_irqs_ioctl(), vfio_platform_irq_init() and vfio_platform_irq_cleanup() functions in drivers/vfio/platform/vfio_platform_irq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Improper error handling

EUVDB-ID: #VU92058

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26814

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the vfio_fsl_mc_set_irq_trigger() function in drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Use of uninitialized resource

EUVDB-ID: #VU90877

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26863

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the hsr_get_node() function in net/hsr/hsr_framereg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Buffer overflow

EUVDB-ID: #VU91312

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26889

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the hci_get_dev_info() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Buffer overflow

EUVDB-ID: #VU93805

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26920

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the register_snapshot_trigger() function in kernel/trace/trace_events_trigger.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Information disclosure

EUVDB-ID: #VU91358

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26935

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Use-after-free

EUVDB-ID: #VU90186

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26961

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mac802154_llsec_key_del_rcu() function in net/mac802154/llsec.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Improper locking

EUVDB-ID: #VU90774

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26976

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Input validation error

EUVDB-ID: #VU94132

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27015

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nf_flow_tuple_encap() function in net/netfilter/nf_flow_table_ip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Race condition within a thread

EUVDB-ID: #VU91431

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27019

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a data race within the __nft_obj_type_get() and nft_obj_type_get() functions in net/netfilter/nf_tables_api.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Race condition within a thread

EUVDB-ID: #VU91432

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27020

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to a data race within the __nft_expr_type_get() and nft_expr_type_get() functions in net/netfilter/nf_tables_api.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Improper error handling

EUVDB-ID: #VU93453

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27025

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nbd_genl_status() function in drivers/block/nbd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Resource management error

EUVDB-ID: #VU94105

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27065

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the nf_tables_updtable() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Improper locking

EUVDB-ID: #VU92026

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27402

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the pep_sock_enable() and pep_ioctl() functions in net/phonet/pep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Resource management error

EUVDB-ID: #VU93202

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27437

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vfio_intx_set_signal() function in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) Improper locking

EUVDB-ID: #VU91519

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35805

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the dm_exception_table_exit() function in drivers/md/dm-snap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) Improper locking

EUVDB-ID: #VU91448

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35819

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qman_create_portal(), qm_congestion_task(), qman_create_cgr(), qman_delete_cgr() and qman_update_cgr() functions in drivers/soc/fsl/qbman/qman.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Use of uninitialized resource

EUVDB-ID: #VU93435

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35837

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mvpp2_bm_pool_cleanup() and mvpp2_bm_init() functions in drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Memory leak

EUVDB-ID: #VU89984

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35853

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mlxsw_sp_acl_tcam_vchunk_migrate_start() and mlxsw_sp_acl_tcam_vregion_migrate() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Use-after-free

EUVDB-ID: #VU90162

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35854

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_vregion_rehash() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Use-after-free

EUVDB-ID: #VU90163

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35855

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_ventry_activity_get() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Input validation error

EUVDB-ID: #VU93427

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-35889

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the idpf_rx_process_skb_fields() function in drivers/net/ethernet/intel/idpf/idpf_txrx.c when handling unknown packet types. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Improper error handling

EUVDB-ID: #VU93651

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35890

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the skb_gro_receive_list() and skb_gro_receive() functions in net/core/skbuff.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Memory leak

EUVDB-ID: #VU93609

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35893

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tcf_skbmod_dump() function in net/sched/act_skbmod.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Use-after-free

EUVDB-ID: #VU90160

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35899

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nf_tables_module_exit() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Improper locking

EUVDB-ID: #VU92020

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35934

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the smc_pnet_create_pnetids_list() function in net/smc/smc_pnet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) Out-of-bounds read

EUVDB-ID: #VU91391

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35949

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __btrfs_check_leaf() and __btrfs_check_node() functions in fs/btrfs/tree-checker.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Improper locking

EUVDB-ID: #VU92019

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35961

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mlx5_sf_dev_remove() function in drivers/net/ethernet/mellanox/mlx5/core/sf/dev/driver.c, within the mlx5_init_one_devl_locked(), mlx5_init_one(), mlx5_uninit_one(), mlx5_init_one_light(), mlx5_uninit_one_light(), probe_one() and remove_one() functions in drivers/net/ethernet/mellanox/mlx5/core/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Use-after-free

EUVDB-ID: #VU90144

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35979

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the raid1_write_request() function in drivers/md/raid1.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Buffer overflow

EUVDB-ID: #VU92955

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35995

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the show_cppc_data(), acpi_cppc_processor_probe(), cpc_read() and cpc_write() functions in drivers/acpi/cppc_acpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Reachable Assertion

EUVDB-ID: #VU90907

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36000

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the alloc_huge_page() function in mm/hugetlb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Resource management error

EUVDB-ID: #VU93281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36004

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the i40e_init_module() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Infinite loop

EUVDB-ID: #VU93062

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36288

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the gss_read_proxy_verf() function in net/sunrpc/auth_gss/svcauth_gss.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Use of uninitialized resource

EUVDB-ID: #VU90975

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36889

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) NULL pointer dereference

EUVDB-ID: #VU91224

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36901

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ip6_output() function in net/ipv6/ip6_output.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) NULL pointer dereference

EUVDB-ID: #VU91222

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36902

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __fib6_rule_action() function in net/ipv6/fib6_rules.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Use-after-free

EUVDB-ID: #VU93085

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36909

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vmbus_free_ring() function in drivers/hv/channel.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Use-after-free

EUVDB-ID: #VU93345

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36910

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hv_uio_cleanup() and hv_uio_probe() functions in drivers/uio/uio_hv_generic.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Use-after-free

EUVDB-ID: #VU93346

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36911

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the free_netvsc_device() function in drivers/net/hyperv/netvsc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Information disclosure

EUVDB-ID: #VU91324

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36912

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the __vmbus_establish_gpadl() and kfree() functions in drivers/hv/channel.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Information disclosure

EUVDB-ID: #VU91323

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36913

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the vmbus_connect() and vmbus_disconnect() functions in drivers/hv/connection.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Out-of-bounds read

EUVDB-ID: #VU90269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36914

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dm_resume(), get_highest_refresh_rate_mode() and amdgpu_dm_commit_audio() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Improper locking

EUVDB-ID: #VU92010

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36919

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bnx2fc_free_session_resc() function in drivers/scsi/bnx2fc/bnx2fc_tgt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Use of uninitialized resource

EUVDB-ID: #VU90864

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36923

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the v9fs_evict_inode() function in fs/9p/vfs_inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) Improper locking

EUVDB-ID: #VU90734

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36924

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the lpfc_set_rrq_active() and lpfc_sli_post_recovery_event() functions in drivers/scsi/lpfc/lpfc_sli.c, within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c, within the lpfc_els_retry_delay() function in drivers/scsi/lpfc/lpfc_els.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) NULL pointer dereference

EUVDB-ID: #VU90384

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36926

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pci_dma_bus_setup_pSeriesLP() function in arch/powerpc/platforms/pseries/iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) Improper error handling

EUVDB-ID: #VU92054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36939

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nfs_net_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

180) NULL pointer dereference

EUVDB-ID: #VU90528

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36941

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nl80211_set_coalesce() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

181) Memory leak

EUVDB-ID: #VU89927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36942

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qca_download_firmware() function in drivers/bluetooth/btqca.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

182) Improper locking

EUVDB-ID: #VU91502

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36944

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qxl_fence_wait() function in drivers/gpu/drm/qxl/qxl_release.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

183) Buffer overflow

EUVDB-ID: #VU93469

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36946

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the rtm_phonet_notify() function in net/phonet/pn_netlink.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

184) Memory leak

EUVDB-ID: #VU91614

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36947

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the remove_device_files() function in drivers/infiniband/hw/qib/qib_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

185) Improper error handling

EUVDB-ID: #VU92055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36950

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

186) Race condition

EUVDB-ID: #VU91463

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36952

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the lpfc_vport_delete() function in drivers/scsi/lpfc/lpfc_vport.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

187) Memory leak

EUVDB-ID: #VU91613

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36955

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the is_link_enabled() function in sound/hda/intel-sdw-acpi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

188) Information disclosure

EUVDB-ID: #VU91321

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36959

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the pinctrl_dt_to_map() function in drivers/pinctrl/devicetree.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

189) Input validation error

EUVDB-ID: #VU93310

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36974

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the taprio_parse_mqprio_opt() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

190) NULL pointer dereference

EUVDB-ID: #VU92349

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38548

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cdns_mhdp_atomic_enable() function in drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

191) Use-after-free

EUVDB-ID: #VU92307

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38555

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cmd_comp_notifier() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

192) Input validation error

EUVDB-ID: #VU94117

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-38558

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when parsing ICMPv6 packets within the parse_icmpv6() function in net/openvswitch/flow.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

193) Out-of-bounds read

EUVDB-ID: #VU92328

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38559

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the qedf_dbg_debug_cmd_write() function in drivers/scsi/qedf/qedf_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

194) Use-after-free

EUVDB-ID: #VU92309

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38570

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gfs2_gl_hash_clear() function in fs/gfs2/super.c, within the init_sbd() function in fs/gfs2/ops_fstype.c, within the gdlm_ast(), gdlm_bast() and gdlm_put_lock() functions in fs/gfs2/lock_dlm.c, within the glock_blocked_by_withdraw() and gfs2_gl_hash_clear() functions in fs/gfs2/glock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

195) Buffer overflow

EUVDB-ID: #VU93134

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38586

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rtl8169_doorbell() and rtl8169_start_xmit() functions in drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

196) Use-after-free

EUVDB-ID: #VU92312

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38588

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lookup_rec(), ftrace_location_range(), ftrace_process_locs(), ftrace_release_mod() and ftrace_free_mem() functions in kernel/trace/ftrace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

197) Out-of-bounds read

EUVDB-ID: #VU92320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38598

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __acquires() function in drivers/md/md-bitmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

198) Improper locking

EUVDB-ID: #VU93037

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-38628

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the free_ep_fback(), u_audio_set_volume(), u_audio_set_mute() and g_audio_setup() functions in drivers/usb/gadget/function/u_audio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

199) Memory leak

EUVDB-ID: #VU93320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39276

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ext4_xattr_block_cache_find() function in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

200) NULL pointer dereference

EUVDB-ID: #VU93329

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39371

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the io_ring_buffer_select() function in io_uring/kbuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

201) Use-after-free

EUVDB-ID: #VU93322

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39463

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the v9fs_cached_dentry_delete() function in fs/9p/vfs_dentry.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

202) Out-of-bounds read

EUVDB-ID: #VU93820

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39472

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the xlog_do_recovery_pass() function in fs/xfs/xfs_log_recover.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

203) Division by zero

EUVDB-ID: #VU93828

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39475

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the savagefb_probe() function in drivers/video/fbdev/savage/savagefb_driver.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

204) Out-of-bounds read

EUVDB-ID: #VU93821

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39482

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bch_dirty_init_thread() and bch_sectors_dirty_init() functions in drivers/md/bcache/writeback.c, within the bch_root_usage() function in drivers/md/bcache/sysfs.c, within the bch_cache_set_alloc() function in drivers/md/bcache/super.c, within the btree_gc_mark_node(), btree_gc_rewrite_node(), btree_gc_recurse(), bch_btree_check_recurse(), bch_btree_check_thread(), bch_btree_check(), bch_btree_map_nodes_recurse() and bch_btree_map_keys_recurse() functions in drivers/md/bcache/btree.c, within the bch_dump_bucket(), __bch_check_keys(), bch_btree_insert_key(), bch_btree_iter_push(), bch_btree_sort_partial() and bch_btree_sort_into() functions in drivers/md/bcache/bset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

205) Out-of-bounds read

EUVDB-ID: #VU93889

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39487

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the bond_option_arp_ip_targets_set() function in drivers/net/bonding/bond_options.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

206) Improper error handling

EUVDB-ID: #VU94087

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39488

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the arch/arm64/include/asm/asm-bug.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

207) Memory leak

EUVDB-ID: #VU94085

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39490

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the seg6_input_core() function in net/ipv6/seg6_iptunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

208) Memory leak

EUVDB-ID: #VU94086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39493

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the adf_device_reset_worker() and adf_dev_aer_schedule_reset() functions in drivers/crypto/qat/qat_common/adf_aer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

209) Use-after-free

EUVDB-ID: #VU94223

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39494

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ima_eventname_init_common() function in security/integrity/ima/ima_template_lib.c, within the ima_collect_measurement() and ima_d_path() functions in security/integrity/ima/ima_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

210) Buffer overflow

EUVDB-ID: #VU94313

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39497

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

211) Memory leak

EUVDB-ID: #VU94201

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39499

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the event_deliver() function in drivers/misc/vmw_vmci/vmci_event.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

212) NULL pointer dereference

EUVDB-ID: #VU94262

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39500

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sock_map_close() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

213) Improper locking

EUVDB-ID: #VU94277

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39501

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the uevent_show() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

214) NULL pointer dereference

EUVDB-ID: #VU94261

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39502

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ionic_qcq_enable() function in drivers/net/ethernet/pensando/ionic/ionic_lif.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

215) NULL pointer dereference

EUVDB-ID: #VU94259

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39505

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the komeda_component_get_avail_scaler() function in drivers/gpu/drm/arm/display/komeda/komeda_pipeline_state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

216) NULL pointer dereference

EUVDB-ID: #VU94258

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39506

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lio_vf_rep_copy_packet() function in drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

217) Improper locking

EUVDB-ID: #VU94284

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39507

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hclge_push_link_status(), hclge_update_link_status(), hclge_uninit_need_wait() and hclge_uninit_client_instance() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

218) Use-after-free

EUVDB-ID: #VU94229

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39508

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the WORKER_IDLE_TIMEOUT(), io_work_get_acct(), io_worker_exit(), io_wq_dec_running(), __io_worker_busy(), io_wq_worker(), io_wq_worker_running(), io_wq_worker_sleeping(), io_init_new_worker(), init_completion() and io_wq_work_match_item() functions in io_uring/io-wq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

219) Resource management error

EUVDB-ID: #VU94310

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-39509

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the implement() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

220) Use-after-free

EUVDB-ID: #VU94226

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40900

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_flush_reqs() function in fs/cachefiles/daemon.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

221) Out-of-bounds read

EUVDB-ID: #VU94233

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40901

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the mpt3sas_base_attach() and _base_check_ioc_facts_changes() functions in drivers/scsi/mpt3sas/mpt3sas_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

222) Buffer overflow

EUVDB-ID: #VU94296

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40902

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ea_get() function in fs/jfs/xattr.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

223) Use-after-free

EUVDB-ID: #VU94225

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40903

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tcpm_register_sink_caps() function in drivers/usb/typec/tcpm/tcpm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

224) Improper locking

EUVDB-ID: #VU94283

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40904

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the wdm_int_callback() function in drivers/usb/class/cdc-wdm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

225) Memory leak

EUVDB-ID: #VU94202

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40906

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mlx5_function_teardown() function in drivers/net/ethernet/mellanox/mlx5/core/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

226) Input validation error

EUVDB-ID: #VU94316

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40908

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __bpf_prog_test_run_raw_tp() function in net/bpf/test_run.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

227) Use-after-free

EUVDB-ID: #VU94224

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40909

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bpf_obj_get(), bpf_link_defer_dealloc_mult_rcu_gp() and bpf_link_free() functions in kernel/bpf/syscall.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

228) NULL pointer dereference

EUVDB-ID: #VU94256

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40911

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cfg80211_get_station() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

229) Improper locking

EUVDB-ID: #VU94282

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40912

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ieee80211_sta_ps_deliver_wakeup() function in net/mac80211/sta_info.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

230) Improper locking

EUVDB-ID: #VU94281

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40916

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hdmi_get_modes() function in drivers/gpu/drm/exynos/exynos_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

231) NULL pointer dereference

EUVDB-ID: #VU94254

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40919

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __hwrm_send() function in drivers/net/ethernet/broadcom/bnxt/bnxt_hwrm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

232) Improper error handling

EUVDB-ID: #VU94290

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40923

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the vmxnet3_rq_destroy_all_rxdataring() function in drivers/net/vmxnet3/vmxnet3_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

233) Buffer overflow

EUVDB-ID: #VU94314

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40924

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/gpu/drm/i915/gem/i915_gem_object.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

234) Use-after-free

EUVDB-ID: #VU94220

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40927

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xhci_invalidate_cancelled_tds() and xhci_handle_cmd_set_deq() functions in drivers/usb/host/xhci-ring.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

235) Out-of-bounds read

EUVDB-ID: #VU94234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40929

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_scan_umac_dwell() and iwl_mvm_scan_umac_dwell_v10() functions in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

236) Use of uninitialized resource

EUVDB-ID: #VU94293

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40931

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

237) Memory leak

EUVDB-ID: #VU94204

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40932

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vidi_get_modes() function in drivers/gpu/drm/exynos/exynos_drm_vidi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

238) Memory leak

EUVDB-ID: #VU94205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40934

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the logi_dj_recv_switch_to_dj_mode() function in drivers/hid/hid-logitech-dj.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

239) Use-after-free

EUVDB-ID: #VU94219

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40935

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_daemon_open() function in fs/cachefiles/daemon.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

240) Double free

EUVDB-ID: #VU94289

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40937

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the gve_rx_skb_hash() and gve_rx_poll_dqo() functions in drivers/net/ethernet/google/gve/gve_rx_dqo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

241) Input validation error

EUVDB-ID: #VU94322

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40940

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mlx5_lag_create_port_sel_table() function in drivers/net/ethernet/mellanox/mlx5/core/lag/port_sel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

242) Buffer overflow

EUVDB-ID: #VU94315

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40941

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the iwl_mvm_mfu_assert_dump_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

243) Memory leak

EUVDB-ID: #VU94207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40942

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mesh_path_discard_frame() function in net/mac80211/mesh_pathtbl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

244) Improper locking

EUVDB-ID: #VU94278

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40943

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __ocfs2_change_file_space() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

245) NULL pointer dereference

EUVDB-ID: #VU94250

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40945

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the include/linux/iommu.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

246) Out-of-bounds read

EUVDB-ID: #VU94236

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40953

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the kvm_vcpu_on_spin() function in virt/kvm/kvm_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

247) Use-after-free

EUVDB-ID: #VU94217

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40954

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sk_common_release() function in net/core/sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

248) Use-after-free

EUVDB-ID: #VU94216

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40956

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the irq_process_work_list() function in drivers/dma/idxd/irq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

249) Use-after-free

EUVDB-ID: #VU94215

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40958

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

250) NULL pointer dereference

EUVDB-ID: #VU94246

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40959

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xfrm6_get_saddr() function in net/ipv6/xfrm6_policy.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

251) NULL pointer dereference

EUVDB-ID: #VU94245

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40960

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rt6_probe() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

252) NULL pointer dereference

EUVDB-ID: #VU94244

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40961

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fib6_nh_init() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

253) Improper locking

EUVDB-ID: #VU94275

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40966

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the con_cleanup() function in drivers/tty/vt/vt.c, within the tty_set_ldisc() function in drivers/tty/tty_ldisc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

254) Improper locking

EUVDB-ID: #VU94274

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40967

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the imx_uart_console_write() function in drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

255) Resource management error

EUVDB-ID: #VU94300

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40970

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the axi_desc_alloc(), axi_desc_get() and axi_chan_block_xfer_complete() functions in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

256) Improper locking

EUVDB-ID: #VU94272

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40972

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_xattr_set_entry(), iput(), ext4_xattr_block_set() and ext4_xattr_ibody_set() functions in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

257) Race condition

EUVDB-ID: #VU94297

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40976

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the lima_sched_timedout_job() function in drivers/gpu/drm/lima/lima_sched.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

258) Improper locking

EUVDB-ID: #VU94271

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40977

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mt76s_tx_status_data() function in drivers/net/wireless/mediatek/mt76/sdio.c, within the mt7921s_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/sdio_mac.c, within the mt7921e_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/pci_mac.c, within the mt7921_mac_reset_work() function in drivers/net/wireless/mediatek/mt76/mt7921/mac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

259) Improper locking

EUVDB-ID: #VU94269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40981

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the batadv_purge_orig_ref() function in net/batman-adv/originator.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

260) NULL pointer dereference

EUVDB-ID: #VU94240

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40982

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ssb_bus_match() function in drivers/ssb/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

261) NULL pointer dereference

EUVDB-ID: #VU94239

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40984

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the acpi_ex_system_memory_space_handler() function in drivers/acpi/acpica/exregion.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

262) Resource management error

EUVDB-ID: #VU94307

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40987

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

263) Resource management error

EUVDB-ID: #VU94308

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40988

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/radeon/sumo_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

264) Input validation error

EUVDB-ID: #VU94324

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40989

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vgic_v3_free_redist_region() and vgic_v3_set_redist_base() functions in arch/arm64/kvm/vgic/vgic-mmio-v3.c, within the kvm_vgic_dist_destroy() function in arch/arm64/kvm/vgic/vgic-init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

265) Input validation error

EUVDB-ID: #VU94325

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40990

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mlx5_ib_create_srq() function in drivers/infiniband/hw/mlx5/srq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

266) Integer overflow

EUVDB-ID: #VU94294

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40994

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the max_vclocks_store() function in drivers/ptp/ptp_sysfs.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

267) Improper locking

EUVDB-ID: #VU94266

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40998

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __ext4_fill_super() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

268) Input validation error

EUVDB-ID: #VU94287

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-40999

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ena_com_cdesc_rx_pkt_get() and ena_com_rx_pkt() functions in drivers/net/ethernet/amazon/ena/ena_eth_com.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

269) Memory leak

EUVDB-ID: #VU94212

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41002

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sec_alg_resource_free() function in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

270) Improper locking

EUVDB-ID: #VU94265

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41004

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the kernel/trace/Kconfig. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

271) Memory leak

EUVDB-ID: #VU94213

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41006

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nr_heartbeat_expiry() function in net/netrom/nr_timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

272) Input validation error

EUVDB-ID: #VU94508

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41009

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __aligned(), bpf_ringbuf_alloc(), bpf_ringbuf_restore_from_rec() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

273) Input validation error

EUVDB-ID: #VU94530

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41011

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the kfd_ioctl_alloc_memory_of_gpu(), criu_restore_memory_of_gpu() and kfd_mmio_mmap() functions in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

274) Use-after-free

EUVDB-ID: #VU94672

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41012

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fcntl_setlk() function in fs/locks.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

275) Out-of-bounds read

EUVDB-ID: #VU94835

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41013

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __xfs_dir3_data_check() function in fs/xfs/libxfs/xfs_dir2_data.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

276) Out-of-bounds read

EUVDB-ID: #VU94836

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41014

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the xlog_recover_process_data() function in fs/xfs/xfs_log_recover.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

277) Input validation error

EUVDB-ID: #VU94842

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41015

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

278) Out-of-bounds read

EUVDB-ID: #VU94837

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41016

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ocfs2_xattr_find_entry() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

279) Input validation error

EUVDB-ID: #VU94843

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41017

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __jfs_getxattr() and jfs_listxattr() functions in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

280) Use-after-free

EUVDB-ID: #VU94949

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41040

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the net/sched/act_ct.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

281) Resource management error

EUVDB-ID: #VU95069

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41041

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the sock_set_flag() and spin_unlock() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

282) Input validation error

EUVDB-ID: #VU95108

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41044

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ppp_read() and ppp_write() functions in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

283) NULL pointer dereference

EUVDB-ID: #VU94982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41048

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sk_msg_recvmsg() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

284) Use-after-free

EUVDB-ID: #VU94945

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_free_volume() function in fs/cachefiles/volume.c, within the cachefiles_withdraw_objects() and cachefiles_withdraw_cache() functions in fs/cachefiles/cache.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

285) Use-after-free

EUVDB-ID: #VU94944

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41058

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cachefiles_withdraw_volumes() function in fs/cachefiles/cache.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

286) Use of uninitialized resource

EUVDB-ID: #VU95033

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41059

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

287) Improper locking

EUVDB-ID: #VU94992

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41063

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the hci_unregister_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

288) Improper locking

EUVDB-ID: #VU94991

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41064

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the eeh_pe_bus_get() function in arch/powerpc/kernel/eeh_pe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

289) Memory leak

EUVDB-ID: #VU94927

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41066

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ibmvnic_xmit() function in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

290) Use-after-free

EUVDB-ID: #VU94943

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41069

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the soc_tplg_dapm_graph_elems_load() function in sound/soc/soc-topology.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

291) Use-after-free

EUVDB-ID: #VU94942

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41070

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

292) Out-of-bounds read

EUVDB-ID: #VU94956

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41071

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ieee80211_prep_hw_scan() function in net/mac80211/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

293) Input validation error

EUVDB-ID: #VU95106

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41072

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

294) Memory leak

EUVDB-ID: #VU94928

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41076

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nfs4_set_security_label() function in fs/nfs/nfs4proc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

295) Memory leak

EUVDB-ID: #VU94929

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41078

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the btrfs_quota_disable() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

296) Resource management error

EUVDB-ID: #VU95051

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41081

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

297) Double free

EUVDB-ID: #VU95008

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41087

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the ata_host_alloc() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

298) Out-of-bounds read

EUVDB-ID: #VU94840

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41090

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the tap_get_user_xdp() function in drivers/net/tap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

299) Out-of-bounds read

EUVDB-ID: #VU94841

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41091

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the tun_xdp_one() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

300) Type Confusion

EUVDB-ID: #VU94923

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42070

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a type confusion error within the nft_lookup_init() function in net/netfilter/nft_lookup.c, within the nf_tables_fill_setelem() and nft_validate_register_store() functions in net/netfilter/nf_tables_api.c. A local user can pass specially crafted data to the packet filtering to trigger a type confusion error and gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

301) NULL pointer dereference

EUVDB-ID: #VU94968

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42079

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gfs2_jindex_free() function in fs/gfs2/super.c, within the lops_before_commit() function in fs/gfs2/log.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

302) Buffer overflow

EUVDB-ID: #VU95039

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42093

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the dpaa2_eth_xdp_xmit() and update_xps() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

303) Improper locking

EUVDB-ID: #VU94987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42096

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the profile_pc() function in arch/x86/kernel/time.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

304) Use-after-free

EUVDB-ID: #VU94936

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42105

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_store_disk_layout() function in fs/nilfs2/the_nilfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

305) NULL pointer dereference

EUVDB-ID: #VU94961

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42122

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c, within the dcn321_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c, within the dcn32_hpo_dp_link_encoder_create() and dml1_validate() functions in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn314_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn31_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c, within the dcn30_validate_bandwidth() function in drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c, within the dcn32_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c, within the dcn3_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

306) Input validation error

EUVDB-ID: #VU95097

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42124

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qedf_execute_tmf() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

307) Buffer overflow

EUVDB-ID: #VU95054

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42145

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

308) Use of uninitialized resource

EUVDB-ID: #VU95027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42161

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the tools/lib/bpf/bpf_core_read.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

309) Improper error handling

EUVDB-ID: #VU95012

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42224

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mv88e6xxx_default_mdio_bus() function in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

310) Resource management error

EUVDB-ID: #VU95062

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42230

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the define_machine() function in arch/powerpc/platforms/pseries/setup.c, within the pseries_kexec_cpu_down() function in arch/powerpc/platforms/pseries/kexec.c, within the default_machine_kexec() function in arch/powerpc/kexec/core_64.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.5

SUSE Linux Enterprise Micro: 5.5

SUSE Real Time Module: 15-SP5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kernel-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug: before 5.14.21-150500.13.64.1

kernel-rt-vdso: before 5.14.21-150500.13.64.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1

kernel-rt-extra: before 5.14.21-150500.13.64.1

kernel-syms-rt: before 5.14.21-150500.13.64.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debugsource: before 5.14.21-150500.13.64.1

kernel-rt-optional: before 5.14.21-150500.13.64.1

dlm-kmp-rt: before 5.14.21-150500.13.64.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1

kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt: before 5.14.21-150500.13.64.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-devel: before 5.14.21-150500.13.64.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1

reiserfs-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1

gfs2-kmp-rt: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt: before 5.14.21-150500.13.64.1

kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1

kernel-rt_debug-devel: before 5.14.21-150500.13.64.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1

kernel-rt-livepatch: before 5.14.21-150500.13.64.1

kernel-devel-rt: before 5.14.21-150500.13.64.1

kernel-source-rt: before 5.14.21-150500.13.64.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###