Risk | High |
Patch available | YES |
Number of vulnerabilities | 310 |
CVE-ID | CVE-2021-47086 CVE-2021-47103 CVE-2021-47186 CVE-2021-47402 CVE-2021-47546 CVE-2021-47547 CVE-2021-47588 CVE-2021-47590 CVE-2021-47591 CVE-2021-47593 CVE-2021-47598 CVE-2021-47599 CVE-2021-47606 CVE-2021-47622 CVE-2021-47623 CVE-2021-47624 CVE-2022-48713 CVE-2022-48730 CVE-2022-48732 CVE-2022-48749 CVE-2022-48756 CVE-2022-48773 CVE-2022-48774 CVE-2022-48775 CVE-2022-48776 CVE-2022-48777 CVE-2022-48778 CVE-2022-48780 CVE-2022-48783 CVE-2022-48784 CVE-2022-48785 CVE-2022-48786 CVE-2022-48787 CVE-2022-48788 CVE-2022-48789 CVE-2022-48790 CVE-2022-48791 CVE-2022-48792 CVE-2022-48793 CVE-2022-48794 CVE-2022-48796 CVE-2022-48797 CVE-2022-48798 CVE-2022-48799 CVE-2022-48800 CVE-2022-48801 CVE-2022-48802 CVE-2022-48803 CVE-2022-48804 CVE-2022-48805 CVE-2022-48806 CVE-2022-48807 CVE-2022-48809 CVE-2022-48810 CVE-2022-48811 CVE-2022-48812 CVE-2022-48813 CVE-2022-48814 CVE-2022-48815 CVE-2022-48816 CVE-2022-48817 CVE-2022-48818 CVE-2022-48820 CVE-2022-48821 CVE-2022-48822 CVE-2022-48823 CVE-2022-48824 CVE-2022-48825 CVE-2022-48826 CVE-2022-48827 CVE-2022-48828 CVE-2022-48829 CVE-2022-48830 CVE-2022-48831 CVE-2022-48834 CVE-2022-48835 CVE-2022-48836 CVE-2022-48837 CVE-2022-48838 CVE-2022-48839 CVE-2022-48840 CVE-2022-48841 CVE-2022-48842 CVE-2022-48843 CVE-2022-48844 CVE-2022-48846 CVE-2022-48847 CVE-2022-48849 CVE-2022-48850 CVE-2022-48851 CVE-2022-48852 CVE-2022-48853 CVE-2022-48855 CVE-2022-48856 CVE-2022-48857 CVE-2022-48858 CVE-2022-48859 CVE-2022-48860 CVE-2022-48861 CVE-2022-48862 CVE-2022-48863 CVE-2022-48864 CVE-2022-48866 CVE-2023-1582 CVE-2023-37453 CVE-2023-52435 CVE-2023-52573 CVE-2023-52580 CVE-2023-52591 CVE-2023-52735 CVE-2023-52751 CVE-2023-52762 CVE-2023-52775 CVE-2023-52812 CVE-2023-52857 CVE-2023-52863 CVE-2023-52885 CVE-2023-52886 CVE-2024-25741 CVE-2024-26583 CVE-2024-26584 CVE-2024-26585 CVE-2024-26615 CVE-2024-26633 CVE-2024-26635 CVE-2024-26636 CVE-2024-26641 CVE-2024-26661 CVE-2024-26663 CVE-2024-26665 CVE-2024-26800 CVE-2024-26802 CVE-2024-26813 CVE-2024-26814 CVE-2024-26863 CVE-2024-26889 CVE-2024-26920 CVE-2024-26935 CVE-2024-26961 CVE-2024-26976 CVE-2024-27015 CVE-2024-27019 CVE-2024-27020 CVE-2024-27025 CVE-2024-27065 CVE-2024-27402 CVE-2024-27437 CVE-2024-35805 CVE-2024-35819 CVE-2024-35837 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35889 CVE-2024-35890 CVE-2024-35893 CVE-2024-35899 CVE-2024-35934 CVE-2024-35949 CVE-2024-35961 CVE-2024-35979 CVE-2024-35995 CVE-2024-36000 CVE-2024-36004 CVE-2024-36288 CVE-2024-36889 CVE-2024-36901 CVE-2024-36902 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36919 CVE-2024-36923 CVE-2024-36924 CVE-2024-36926 CVE-2024-36939 CVE-2024-36941 CVE-2024-36942 CVE-2024-36944 CVE-2024-36946 CVE-2024-36947 CVE-2024-36950 CVE-2024-36952 CVE-2024-36955 CVE-2024-36959 CVE-2024-36974 CVE-2024-38548 CVE-2024-38555 CVE-2024-38558 CVE-2024-38559 CVE-2024-38570 CVE-2024-38586 CVE-2024-38588 CVE-2024-38598 CVE-2024-38628 CVE-2024-39276 CVE-2024-39371 CVE-2024-39463 CVE-2024-39472 CVE-2024-39475 CVE-2024-39482 CVE-2024-39487 CVE-2024-39488 CVE-2024-39490 CVE-2024-39493 CVE-2024-39494 CVE-2024-39497 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501 CVE-2024-39502 CVE-2024-39505 CVE-2024-39506 CVE-2024-39507 CVE-2024-39508 CVE-2024-39509 CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903 CVE-2024-40904 CVE-2024-40906 CVE-2024-40908 CVE-2024-40909 CVE-2024-40911 CVE-2024-40912 CVE-2024-40916 CVE-2024-40919 CVE-2024-40923 CVE-2024-40924 CVE-2024-40927 CVE-2024-40929 CVE-2024-40931 CVE-2024-40932 CVE-2024-40934 CVE-2024-40935 CVE-2024-40937 CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943 CVE-2024-40945 CVE-2024-40953 CVE-2024-40954 CVE-2024-40956 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40966 CVE-2024-40967 CVE-2024-40970 CVE-2024-40972 CVE-2024-40976 CVE-2024-40977 CVE-2024-40981 CVE-2024-40982 CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990 CVE-2024-40994 CVE-2024-40998 CVE-2024-40999 CVE-2024-41002 CVE-2024-41004 CVE-2024-41006 CVE-2024-41009 CVE-2024-41011 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41015 CVE-2024-41016 CVE-2024-41017 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41048 CVE-2024-41057 CVE-2024-41058 CVE-2024-41059 CVE-2024-41063 CVE-2024-41064 CVE-2024-41066 CVE-2024-41069 CVE-2024-41070 CVE-2024-41071 CVE-2024-41072 CVE-2024-41076 CVE-2024-41078 CVE-2024-41081 CVE-2024-41087 CVE-2024-41090 CVE-2024-41091 CVE-2024-42070 CVE-2024-42079 CVE-2024-42093 CVE-2024-42096 CVE-2024-42105 CVE-2024-42122 CVE-2024-42124 CVE-2024-42145 CVE-2024-42161 CVE-2024-42224 CVE-2024-42230 |
CWE-ID | CWE-371 CWE-416 CWE-476 CWE-401 CWE-125 CWE-191 CWE-667 CWE-415 CWE-399 CWE-193 CWE-388 CWE-835 CWE-119 CWE-20 CWE-682 CWE-190 CWE-908 CWE-362 CWE-617 CWE-824 CWE-200 CWE-366 CWE-369 CWE-843 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openSUSE Leap Micro Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Real Time Module Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system kernel-rt Operating systems & Components / Operating system package or component kernel-rt_debug Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_13_64-rt Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component kernel-syms-rt Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component kernel-rt_debug-livepatch-devel Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 310 vulnerabilities.
EUVDB-ID: #VU89260
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47086
CWE-ID:
CWE-371 - State Issues
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect handling of the socket state within the pep_ioctl() function in net/phonet/pep.c. A local user can perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90232
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-47103
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a use-after-free error within the inet6_sk_rx_dst_set(), tcp_v6_do_rcv() and tcp_v6_early_demux() functions in net/ipv6/tcp_ipv6.c, within the udp_sk_rx_dst_set(), __udp4_lib_rcv() and udp_v4_early_demux() functions in net/ipv4/udp.c, within the tcp_v4_do_rcv(), tcp_v4_early_demux(), tcp_prequeue() and inet_sk_rx_dst_set() functions in net/ipv4/tcp_ipv4.c, within the tcp_rcv_established() function in net/ipv4/tcp_input.c, within the tcp_disconnect() function in net/ipv4/tcp.c, within the inet_sock_destruct() function in net/ipv4/af_inet.c. A local user can send specially crafted packets to the system, trigger a use-after-free error and potentially execute arbitrary code.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90581
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47186
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tipc_aead_init() function in net/tipc/crypto.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90142
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47402
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fl_walk() function in net/sched/cls_flower.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89931
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-47546
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within fib6_rule_suppress() function in net/ipv4/fib_rules.c. A remote attacker can send IPv6 packets to the system, trigger memory leak and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91080
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47547
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mii_get_phy() function in drivers/net/ethernet/dec/tulip/de4x5.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92374
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47588
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the sit_init_net() function in net/ipv6/sit.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92354
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47590
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __mptcp_push_pending() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92333
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47591
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mptcp_supported_sockopt() function in net/mptcp/sockopt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92335
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47593
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mptcp_accept() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92302
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47598
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cake_init() function in net/sched/sch_cake.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93763
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47599
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the btrfs_unfreeze() function in fs/btrfs/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92356
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47606
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the netlink_sendmsg() function in net/netlink/af_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94457
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47622
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the EXPORT_SYMBOL_GPL(), ufshcd_hba_capabilities(), ufshcd_wait_for_dev_cmd(), ufshcd_exec_dev_cmd(), ufshcd_issue_devman_upiu_cmd() and ufshcd_init() functions in drivers/scsi/ufs/ufshcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94487
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47623
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the set_pte_at() function in arch/powerpc/mm/pgtable.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94401
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47624
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rpc_sysfs_xprt_state_change() function in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92920
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48713
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pt_handle_status() function in arch/x86/events/intel/pt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92882
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48730
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dma_heap_ioctl() function in drivers/dma-buf/dma-heap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48732
CWE-ID:
CWE-193 - Off-by-one Error
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the nvbios_addr() function in drivers/gpu/drm/nouveau/nvkm/subdev/bios/base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92912
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48749
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dpu_setup_dspp_pcc() function in drivers/gpu/drm/msm/disp/dpu1/dpu_hw_dspp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92915
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48756
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the msm_dsi_phy_driver_unregister() function in drivers/gpu/drm/msm/dsi/phy/dsi_phy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94439
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48773
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rpcrdma_ep_create() function in net/sunrpc/xprtrdma/verbs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94409
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48774
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the pt_core_init() function in drivers/dma/ptdma/ptdma-dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94408
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48775
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vmbus_add_channel_kobj() function in drivers/hv/vmbus_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94491
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48776
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the parse_qcomsmem_cleanup() function in drivers/mtd/parsers/qcomsmempart.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94459
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48777
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the parse_qcomsmem_part() function in drivers/mtd/parsers/qcomsmempart.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94407
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48778
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gpmi_nfc_exec_op() and pm_runtime_mark_last_busy() functions in drivers/mtd/nand/raw/gpmi-nand/gpmi-nand.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94470
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48780
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the smc_fback_error_report() and smc_switch_to_fallback() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94426
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48783
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gswip_remove() function in drivers/net/dsa/lantiq_gswip.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94449
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48784
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cfg80211_event_work() function in net/wireless/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94456
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48785
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mld_newpack() function in net/ipv6/mcast.c, within the EXPORT_SYMBOL() function in net/ipv6/addrconf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94455
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48786
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vsock_stream_connect() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94425
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48787
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iwl_req_fw_callback() function in drivers/net/wireless/intel/iwlwifi/iwl-drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94424
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48788
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_rdma_error_recovery_work() function in drivers/nvme/host/rdma.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94423
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48789
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_tcp_error_recovery_work() function in drivers/nvme/host/tcp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94422
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48790
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nvme_async_event_work() function in drivers/nvme/host/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94421
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48791
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pm8001_exec_internal_tmf_task() function in drivers/scsi/pm8001/pm8001_sas.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94420
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48792
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mpi_ssp_completion() and mpi_sata_completion() functions in drivers/scsi/pm8001/pm80xx_hwi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94441
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48793
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the svm_set_nested_state() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94406
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48794
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the at86rf230_async_error_recover_complete() and at86rf230_async_error_recover() functions in drivers/net/ieee802154/at86rf230.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94419
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48796
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dev_iommu_get() function in drivers/iommu/iommu.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94477
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48797
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the change_pte_range() function in mm/mprotect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94490
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48798
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the io_subchannel_chp_event() function in drivers/s390/cio/device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94478
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48799
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the DEFINE_PER_CPU() and perf_cgroup_switch() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94454
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48800
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the reclaim_throttle() function in mm/vmscan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94416
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48801
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iio_device_buffer_getfd() function in drivers/iio/industrialio-buffer.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94460
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48802
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the smaps_page_accumulate(), smaps_account(), smaps_pte_entry(), smaps_pmd_entry(), pte_to_pagemap_entry() and pagemap_pmd_range() functions in fs/proc/task_mmu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94430
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48803
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/phy/ti/phy-j721e-wiz.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94431
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48804
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vt_ioctl() function in drivers/tty/vt/vt_ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94432
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48805
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ax88179_rx_fixup() function in drivers/net/usb/ax88179_178a.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94467
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48806
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ee1004_eeprom_read() function in drivers/misc/eeprom/ee1004.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94433
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48807
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ice_lag_unlink() and ice_lag_event_handler() functions in drivers/net/ethernet/intel/ice/ice_lag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94405
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48809
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the include/net/dst_metadata.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48810
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip6mr_rules_init() function in net/ipv6/ip6mr.c, within the ipmr_rules_init() function in net/ipv4/ipmr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94444
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48811
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the init_crq_queue(), __ibmvnic_open() and ibmvnic_open() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94476
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48812
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the gswip_mdio_rd(), gswip_mdio(), gswip_mdio_mask() and gswip_remove() functions in drivers/net/dsa/lantiq_gswip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94475
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48813
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vsc9959_mdio_bus_alloc() and vsc9959_mdio_bus_free() functions in drivers/net/dsa/ocelot/felix_vsc9959.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94474
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48814
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vsc9953_mdio_bus_alloc() and vsc9953_mdio_bus_free() functions in drivers/net/dsa/ocelot/seville_vsc9953.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94471
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48815
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm_sf2_mdio_register() function in drivers/net/dsa/bcm_sf2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94452
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48816
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the xs_get_srcport() function in net/sunrpc/xprtsock.c, within the rpc_sysfs_xprt_srcaddr_show() function in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48817
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ar9331_sw_mbus_init() and ar9331_sw_remove() functions in drivers/net/dsa/qca/ar9331.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94461
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48818
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the mv88e6xxx_mdio_register() and mv88e6xxx_mdios_unregister() functions in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94404
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48820
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the stm32_usbphyc_pll_enable() function in drivers/phy/st/phy-stm32-usbphyc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94417
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48821
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fastrpc_dmabuf_alloc() function in drivers/misc/fastrpc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94403
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48822
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ffs_data_put(), ffs_data_new(), ffs_epfiles_destroy() and ffs_func_eps_disable() functions in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94488
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48823
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the qedf_initiate_cleanup() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94445
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48824
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the myrs_cleanup() function in drivers/scsi/myrs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94485
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48825
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the qedf_vport_create() function in drivers/scsi/qedf/qedf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94451
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48826
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vc4_dsi_host_attach() and vc4_dsi_dev_remove() functions in drivers/gpu/drm/vc4/vc4_dsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94479
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48827
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nfsd4_encode_read() and nfsd4_encode_read_plus() functions in fs/nfsd/nfs4xdr.c, within the nfsd4_read() function in fs/nfsd/nfs4proc.c, within the nfsd3_proc_read() function in fs/nfsd/nfs3proc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94466
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48828
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nfsd_setattr() function in fs/nfsd/vfs.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94492
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48829
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the svcxdr_decode_sattr3() function in fs/nfsd/nfs3xdr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94450
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48830
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the LIST_HEAD(), isotp_rcv() and isotp_init() functions in net/can/isotp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94402
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48831
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the asymmetric_verify() function in security/integrity/digsig_asymmetric.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94481
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48834
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the usbtmc_ioctl_request() function in drivers/usb/class/usbtmc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94448
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48835
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mpt3sas_base_sync_reply_irqs() function in drivers/scsi/mpt3sas/mpt3sas_base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94447
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48836
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the aiptek_probe() function in drivers/input/tablet/aiptek.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94465
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48837
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the rndis_set_response() function in drivers/usb/gadget/function/rndis.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94415
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48838
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb_gadget_remove_driver(), udc_bind_to_driver() and dev_err() functions in drivers/usb/gadget/udc/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94392
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48839
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tpacket_rcv() and packet_recvmsg() functions in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94463
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48840
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the iavf_remove() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94435
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48841
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ice_update_vsi_tx_ring_stats() function in drivers/net/ethernet/intel/ice/ice_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94446
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48842
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ice_service_task() function in drivers/net/ethernet/intel/ice/ice_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94436
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48843
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL() function in drivers/gpu/drm/drm_connector.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48844
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the hci_release_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94399
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48846
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the blk_cleanup_queue() function in block/blk-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94428
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48847
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the watch_queue_set_filter() function in kernel/watch_queue.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94484
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48849
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the amdgpu_display_framebuffer_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_display.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94437
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48850
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the speed_show() function in net/core/net-sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94414
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48851
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tx_complete() function in drivers/staging/gdm724x/gdm_lte.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94398
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48852
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vc4_hdmi_audio_init() and vc4_hdmi_unbind() functions in drivers/gpu/drm/vc4/vc4_hdmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94397
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48853
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the Documentation/DMA-attributes.txt, include/linux/dma-mapping.h, lib/swiotlb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94464
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48855
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the inet_diag_msg_sctpasoc_fill() and inet_sctp_diag_fill() functions in net/sctp/sctp_diag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94396
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48856
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gfar_get_ts_info() function in drivers/net/ethernet/freescale/gianfar_ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94412
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48857
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfc_digital_free_device() function in drivers/nfc/port100.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94411
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48858
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cmd_alloc_index() and cmd_ent_get() functions in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94395
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48859
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the prestera_switch_set_base_mac_addr() function in drivers/net/ethernet/marvell/prestera/prestera_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94394
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48860
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xemaclite_of_probe() function in drivers/net/ethernet/xilinx/xilinx_emaclite.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94410
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48861
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vp_vdpa_remove() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94469
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48862
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the vhost_chr_write_iter() function in drivers/vhost/vhost.c, within the vhost_iotlb_add_range_ctx() function in drivers/vhost/iotlb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94393
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48863
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dsp_pipeline_destroy() and dsp_pipeline_build() functions in drivers/isdn/mISDN/dsp_pipeline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94458
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48864
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the handle_ctrl_mq() function in drivers/vdpa/mlx5/net/mlx5_vnet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94429
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48866
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the thrustmaster_interrupts() function in drivers/hid/hid-thrustmaster.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74629
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-1582
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within fs/proc/task_mmu.c. A local user can exploit the race and crash the kernel.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80795
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-37453
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the read_descriptors() function in drivers/usb/core/sysfs.c. An attacker with physical access to the system can attach a malicious USB device, trigger an out-of-bounds read error and crash the kernel.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87748
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52435
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the skb_segment() function. A local user can trigger memory corruption and crash the kernel.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52573
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rds_rdma_cm_event_handler_cmn() function in net/rds/rdma_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89383
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52580
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a reachable assertion in net/core/flow_dissector.c. A remote attacker on the local network can send specially crafted PTP ethernet frames to the system and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91538
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52591
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the reiserfs_rename() function in fs/reiserfs/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91621
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52735
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sock_map_unhash(), sock_map_destroy() and sock_map_close() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90063
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52751
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the find_or_create_cached_dir(), spin_unlock() and open_cached_dir() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93622
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52762
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the virtblk_probe() function in drivers/block/virtio_blk.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93425
Risk: Medium
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52775
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the smcr_clnt_conf_first_link() function in net/smc/af_smc.c when handling SMC DECLINE messages. A remote attacker can send specially crafted SMC DECLINE message to the system, trigger memory corruption and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91085
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52812
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the smu_v13_0_update_pcie_parameters() function in drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91178
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52857
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the mtk_plane_update_new_state() function in drivers/gpu/drm/mediatek/mtk_drm_plane.c, within the mtk_drm_gem_dumb_create() function in drivers/gpu/drm/mediatek/mtk_drm_gem.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90426
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52863
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the axi_fan_control_probe() function in drivers/hwmon/axi-fan-control.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94326
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52885
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the svc_tcp_listen_data_ready() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94434
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52886
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the get_bMaxPacketSize0(), hub_port_init(), hub_port_connect() and usb_reset_and_verify_device() functions in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94364
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-25741
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the printer_write() in drivers/usb/gadget/function/f_printer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87596
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26583
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition between async notify and socket close in TLS implementation in net/tls/tls_sw.c. A remote attacker can send specially crafted traffic to the system, trigger a race condition and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89001
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26584
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error when handling backlogging of crypto requests in net/tls/tls_sw.c. A remote attacker can send specially crafted traffic to the system and perform a denial of service attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89251
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26585
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the tls_encrypt_done() function in net/tls/tls_sw.c. A remote attacker user can send specially crafted requests to the system and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90627
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26615
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __smc_diag_dump() function in net/smc/smc_diag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89267
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26633
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an error in NEXTHDR_FRAGMENT handling within the ip6_tnl_parse_tlv_enc_lim() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90880
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26635
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the cpu_to_be16() function in net/llc/llc_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90859
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26636
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the llc_ui_sendmsg() function in net/llc/af_llc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89396
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-26641
CWE-ID:
CWE-824 - Access of Uninitialized Pointer
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to access to uninitialized data within the __ip6_tnl_rcv() function in net/ipv6/ip6_tunnel.c. A remote attacker can send specially crafted data to the system and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93260
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26661
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dcn21_set_abm_immediate_disable() function in drivers/gpu/drm/amd/display/dc/dcn21/dcn21_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92073
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26663
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tipc_nl_bearer_add() function in net/tipc/bearer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90336
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26665
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the iptunnel_pmtud_build_icmpv6() function in net/ipv4/ip_tunnel_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90210
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the struct_group(), tls_do_decryption() and tls_decrypt_sg() functions in net/tls/tls_sw.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90589
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26802
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the stmmac_fpe_stop_wq() function in drivers/net/ethernet/stmicro/stmmac/stmmac_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90588
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26813
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vfio_platform_set_irq_unmask(), vfio_automasked_irq_handler(), vfio_irq_handler(), vfio_set_trigger(), vfio_platform_set_irq_trigger(), vfio_platform_set_irqs_ioctl(), vfio_platform_irq_init() and vfio_platform_irq_cleanup() functions in drivers/vfio/platform/vfio_platform_irq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92058
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26814
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the vfio_fsl_mc_set_irq_trigger() function in drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90877
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26863
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hsr_get_node() function in net/hsr/hsr_framereg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91312
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26889
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the hci_get_dev_info() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93805
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26920
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the register_snapshot_trigger() function in kernel/trace/trace_events_trigger.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91358
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26935
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90186
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26961
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mac802154_llsec_key_del_rcu() function in net/mac802154/llsec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90774
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26976
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the async_pf_execute(), kvm_clear_async_pf_completion_queue(), kvm_check_async_pf_completion() and kvm_setup_async_pf() functions in virt/kvm/async_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94132
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27015
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nf_flow_tuple_encap() function in net/netfilter/nf_flow_table_ip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91431
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27019
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a data race within the __nft_obj_type_get() and nft_obj_type_get() functions in net/netfilter/nf_tables_api.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91432
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27020
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to a data race within the __nft_expr_type_get() and nft_expr_type_get() functions in net/netfilter/nf_tables_api.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27025
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nbd_genl_status() function in drivers/block/nbd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94105
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27065
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the nf_tables_updtable() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92026
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27402
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pep_sock_enable() and pep_ioctl() functions in net/phonet/pep.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93202
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27437
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vfio_intx_set_signal() function in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91519
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35805
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the dm_exception_table_exit() function in drivers/md/dm-snap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91448
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35819
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qman_create_portal(), qm_congestion_task(), qman_create_cgr(), qman_delete_cgr() and qman_update_cgr() functions in drivers/soc/fsl/qbman/qman.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93435
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35837
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mvpp2_bm_pool_cleanup() and mvpp2_bm_init() functions in drivers/net/ethernet/marvell/mvpp2/mvpp2_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89984
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35853
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mlxsw_sp_acl_tcam_vchunk_migrate_start() and mlxsw_sp_acl_tcam_vregion_migrate() functions in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90162
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35854
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_vregion_rehash() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90163
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35855
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlxsw_sp_acl_tcam_ventry_activity_get() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93427
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-35889
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the idpf_rx_process_skb_fields() function in drivers/net/ethernet/intel/idpf/idpf_txrx.c when handling unknown packet types. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93651
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35890
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the skb_gro_receive_list() and skb_gro_receive() functions in net/core/skbuff.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93609
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35893
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tcf_skbmod_dump() function in net/sched/act_skbmod.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90160
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35899
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nf_tables_module_exit() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92020
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35934
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the smc_pnet_create_pnetids_list() function in net/smc/smc_pnet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35949
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __btrfs_check_leaf() and __btrfs_check_node() functions in fs/btrfs/tree-checker.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92019
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35961
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mlx5_sf_dev_remove() function in drivers/net/ethernet/mellanox/mlx5/core/sf/dev/driver.c, within the mlx5_init_one_devl_locked(), mlx5_init_one(), mlx5_uninit_one(), mlx5_init_one_light(), mlx5_uninit_one_light(), probe_one() and remove_one() functions in drivers/net/ethernet/mellanox/mlx5/core/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90144
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35979
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the raid1_write_request() function in drivers/md/raid1.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92955
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35995
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the show_cppc_data(), acpi_cppc_processor_probe(), cpc_read() and cpc_write() functions in drivers/acpi/cppc_acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90907
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36000
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the alloc_huge_page() function in mm/hugetlb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93281
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36004
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the i40e_init_module() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36288
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the gss_read_proxy_verf() function in net/sunrpc/auth_gss/svcauth_gss.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90975
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36889
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91224
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36901
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ip6_output() function in net/ipv6/ip6_output.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91222
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36902
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __fib6_rule_action() function in net/ipv6/fib6_rules.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93085
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36909
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vmbus_free_ring() function in drivers/hv/channel.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93345
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36910
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hv_uio_cleanup() and hv_uio_probe() functions in drivers/uio/uio_hv_generic.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93346
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36911
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the free_netvsc_device() function in drivers/net/hyperv/netvsc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91324
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36912
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the __vmbus_establish_gpadl() and kfree() functions in drivers/hv/channel.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91323
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36913
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the vmbus_connect() and vmbus_disconnect() functions in drivers/hv/connection.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36914
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dm_resume(), get_highest_refresh_rate_mode() and amdgpu_dm_commit_audio() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92010
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36919
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bnx2fc_free_session_resc() function in drivers/scsi/bnx2fc/bnx2fc_tgt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90864
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36923
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the v9fs_evict_inode() function in fs/9p/vfs_inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90734
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36924
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the lpfc_set_rrq_active() and lpfc_sli_post_recovery_event() functions in drivers/scsi/lpfc/lpfc_sli.c, within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c, within the lpfc_els_retry_delay() function in drivers/scsi/lpfc/lpfc_els.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90384
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36926
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pci_dma_bus_setup_pSeriesLP() function in arch/powerpc/platforms/pseries/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36939
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the nfs_net_init() function in fs/nfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90528
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36941
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nl80211_set_coalesce() function in net/wireless/nl80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36942
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qca_download_firmware() function in drivers/bluetooth/btqca.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91502
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36944
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qxl_fence_wait() function in drivers/gpu/drm/qxl/qxl_release.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93469
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36946
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the rtm_phonet_notify() function in net/phonet/pn_netlink.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91614
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the remove_device_files() function in drivers/infiniband/hw/qib/qib_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36950
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bus_reset_work() and irq_handler() functions in drivers/firewire/ohci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91463
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36952
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the lpfc_vport_delete() function in drivers/scsi/lpfc/lpfc_vport.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91613
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36955
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the is_link_enabled() function in sound/hda/intel-sdw-acpi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91321
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36959
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the pinctrl_dt_to_map() function in drivers/pinctrl/devicetree.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93310
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36974
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the taprio_parse_mqprio_opt() function in net/sched/sch_taprio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92349
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38548
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdns_mhdp_atomic_enable() function in drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92307
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38555
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cmd_comp_notifier() function in drivers/net/ethernet/mellanox/mlx5/core/cmd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94117
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-38558
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when parsing ICMPv6 packets within the parse_icmpv6() function in net/openvswitch/flow.c. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92328
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38559
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qedf_dbg_debug_cmd_write() function in drivers/scsi/qedf/qedf_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92309
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38570
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gfs2_gl_hash_clear() function in fs/gfs2/super.c, within the init_sbd() function in fs/gfs2/ops_fstype.c, within the gdlm_ast(), gdlm_bast() and gdlm_put_lock() functions in fs/gfs2/lock_dlm.c, within the glock_blocked_by_withdraw() and gfs2_gl_hash_clear() functions in fs/gfs2/glock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93134
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38586
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the rtl8169_doorbell() and rtl8169_start_xmit() functions in drivers/net/ethernet/realtek/r8169_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92312
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38588
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lookup_rec(), ftrace_location_range(), ftrace_process_locs(), ftrace_release_mod() and ftrace_free_mem() functions in kernel/trace/ftrace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92320
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38598
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __acquires() function in drivers/md/md-bitmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93037
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38628
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the free_ep_fback(), u_audio_set_volume(), u_audio_set_mute() and g_audio_setup() functions in drivers/usb/gadget/function/u_audio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93320
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39276
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ext4_xattr_block_cache_find() function in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93329
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39371
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the io_ring_buffer_select() function in io_uring/kbuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93322
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39463
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the v9fs_cached_dentry_delete() function in fs/9p/vfs_dentry.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93820
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39472
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the xlog_do_recovery_pass() function in fs/xfs/xfs_log_recover.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93828
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39475
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the savagefb_probe() function in drivers/video/fbdev/savage/savagefb_driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93821
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39482
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bch_dirty_init_thread() and bch_sectors_dirty_init() functions in drivers/md/bcache/writeback.c, within the bch_root_usage() function in drivers/md/bcache/sysfs.c, within the bch_cache_set_alloc() function in drivers/md/bcache/super.c, within the btree_gc_mark_node(), btree_gc_rewrite_node(), btree_gc_recurse(), bch_btree_check_recurse(), bch_btree_check_thread(), bch_btree_check(), bch_btree_map_nodes_recurse() and bch_btree_map_keys_recurse() functions in drivers/md/bcache/btree.c, within the bch_dump_bucket(), __bch_check_keys(), bch_btree_insert_key(), bch_btree_iter_push(), bch_btree_sort_partial() and bch_btree_sort_into() functions in drivers/md/bcache/bset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93889
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39487
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bond_option_arp_ip_targets_set() function in drivers/net/bonding/bond_options.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39488
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the arch/arm64/include/asm/asm-bug.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94085
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39490
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the seg6_input_core() function in net/ipv6/seg6_iptunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39493
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the adf_device_reset_worker() and adf_dev_aer_schedule_reset() functions in drivers/crypto/qat/qat_common/adf_aer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94223
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39494
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ima_eventname_init_common() function in security/integrity/ima/ima_template_lib.c, within the ima_collect_measurement() and ima_d_path() functions in security/integrity/ima/ima_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94313
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39497
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94201
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39499
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the event_deliver() function in drivers/misc/vmw_vmci/vmci_event.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94262
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39500
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sock_map_close() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94277
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39501
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the uevent_show() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39502
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ionic_qcq_enable() function in drivers/net/ethernet/pensando/ionic/ionic_lif.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94259
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39505
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the komeda_component_get_avail_scaler() function in drivers/gpu/drm/arm/display/komeda/komeda_pipeline_state.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94258
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39506
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lio_vf_rep_copy_packet() function in drivers/net/ethernet/cavium/liquidio/lio_vf_rep.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94284
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39507
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hclge_push_link_status(), hclge_update_link_status(), hclge_uninit_need_wait() and hclge_uninit_client_instance() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94229
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39508
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the WORKER_IDLE_TIMEOUT(), io_work_get_acct(), io_worker_exit(), io_wq_dec_running(), __io_worker_busy(), io_wq_worker(), io_wq_worker_running(), io_wq_worker_sleeping(), io_init_new_worker(), init_completion() and io_wq_work_match_item() functions in io_uring/io-wq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94310
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-39509
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the implement() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94226
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40900
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_flush_reqs() function in fs/cachefiles/daemon.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94233
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40901
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the mpt3sas_base_attach() and _base_check_ioc_facts_changes() functions in drivers/scsi/mpt3sas/mpt3sas_base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94296
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40902
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ea_get() function in fs/jfs/xattr.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94225
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40903
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tcpm_register_sink_caps() function in drivers/usb/typec/tcpm/tcpm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94283
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40904
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the wdm_int_callback() function in drivers/usb/class/cdc-wdm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94202
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40906
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mlx5_function_teardown() function in drivers/net/ethernet/mellanox/mlx5/core/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94316
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40908
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __bpf_prog_test_run_raw_tp() function in net/bpf/test_run.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94224
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40909
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bpf_obj_get(), bpf_link_defer_dealloc_mult_rcu_gp() and bpf_link_free() functions in kernel/bpf/syscall.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94256
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40911
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cfg80211_get_station() function in net/wireless/util.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94282
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40912
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ieee80211_sta_ps_deliver_wakeup() function in net/mac80211/sta_info.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94281
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40916
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hdmi_get_modes() function in drivers/gpu/drm/exynos/exynos_hdmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94254
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40919
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __hwrm_send() function in drivers/net/ethernet/broadcom/bnxt/bnxt_hwrm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94290
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40923
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the vmxnet3_rq_destroy_all_rxdataring() function in drivers/net/vmxnet3/vmxnet3_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94314
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40924
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/gpu/drm/i915/gem/i915_gem_object.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94220
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40927
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xhci_invalidate_cancelled_tds() and xhci_handle_cmd_set_deq() functions in drivers/usb/host/xhci-ring.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94234
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40929
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the iwl_mvm_scan_umac_dwell() and iwl_mvm_scan_umac_dwell_v10() functions in drivers/net/wireless/intel/iwlwifi/mvm/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94293
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40931
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mptcp_stream_connect() function in net/mptcp/protocol.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40932
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vidi_get_modes() function in drivers/gpu/drm/exynos/exynos_drm_vidi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40934
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the logi_dj_recv_switch_to_dj_mode() function in drivers/hid/hid-logitech-dj.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94219
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40935
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_daemon_open() function in fs/cachefiles/daemon.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94289
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40937
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the gve_rx_skb_hash() and gve_rx_poll_dqo() functions in drivers/net/ethernet/google/gve/gve_rx_dqo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94322
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40940
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mlx5_lag_create_port_sel_table() function in drivers/net/ethernet/mellanox/mlx5/core/lag/port_sel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94315
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40941
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the iwl_mvm_mfu_assert_dump_notif() function in drivers/net/wireless/intel/iwlwifi/mvm/fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40942
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mesh_path_discard_frame() function in net/mac80211/mesh_pathtbl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40943
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __ocfs2_change_file_space() function in fs/ocfs2/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94250
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40945
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the include/linux/iommu.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40953
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the kvm_vcpu_on_spin() function in virt/kvm/kvm_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94217
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40954
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sk_common_release() function in net/core/sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94216
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40956
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the irq_process_work_list() function in drivers/dma/idxd/irq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94215
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40958
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94246
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40959
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xfrm6_get_saddr() function in net/ipv6/xfrm6_policy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94245
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40960
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rt6_probe() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40961
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fib6_nh_init() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94275
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40966
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the con_cleanup() function in drivers/tty/vt/vt.c, within the tty_set_ldisc() function in drivers/tty/tty_ldisc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94274
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40967
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the imx_uart_console_write() function in drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94300
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40970
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the axi_desc_alloc(), axi_desc_get() and axi_chan_block_xfer_complete() functions in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94272
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40972
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_xattr_set_entry(), iput(), ext4_xattr_block_set() and ext4_xattr_ibody_set() functions in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94297
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40976
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the lima_sched_timedout_job() function in drivers/gpu/drm/lima/lima_sched.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94271
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40977
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mt76s_tx_status_data() function in drivers/net/wireless/mediatek/mt76/sdio.c, within the mt7921s_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/sdio_mac.c, within the mt7921e_mac_reset() function in drivers/net/wireless/mediatek/mt76/mt7921/pci_mac.c, within the mt7921_mac_reset_work() function in drivers/net/wireless/mediatek/mt76/mt7921/mac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40981
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the batadv_purge_orig_ref() function in net/batman-adv/originator.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94240
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40982
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ssb_bus_match() function in drivers/ssb/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94239
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40984
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the acpi_ex_system_memory_space_handler() function in drivers/acpi/acpica/exregion.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94307
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40987
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/amd/amdgpu/kv_dpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94308
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40988
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sumo_construct_vid_mapping_table() function in drivers/gpu/drm/radeon/sumo_dpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94324
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40989
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vgic_v3_free_redist_region() and vgic_v3_set_redist_base() functions in arch/arm64/kvm/vgic/vgic-mmio-v3.c, within the kvm_vgic_dist_destroy() function in arch/arm64/kvm/vgic/vgic-init.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94325
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40990
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mlx5_ib_create_srq() function in drivers/infiniband/hw/mlx5/srq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94294
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40994
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the max_vclocks_store() function in drivers/ptp/ptp_sysfs.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94266
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40998
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __ext4_fill_super() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-40999
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ena_com_cdesc_rx_pkt_get() and ena_com_rx_pkt() functions in drivers/net/ethernet/amazon/ena/ena_eth_com.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94212
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41002
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sec_alg_resource_free() function in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94265
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41004
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the kernel/trace/Kconfig. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94213
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41006
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nr_heartbeat_expiry() function in net/netrom/nr_timer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94508
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41009
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __aligned(), bpf_ringbuf_alloc(), bpf_ringbuf_restore_from_rec() and __bpf_ringbuf_reserve() functions in kernel/bpf/ringbuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94530
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41011
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the kfd_ioctl_alloc_memory_of_gpu(), criu_restore_memory_of_gpu() and kfd_mmio_mmap() functions in drivers/gpu/drm/amd/amdkfd/kfd_chardev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94672
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41012
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fcntl_setlk() function in fs/locks.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94835
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41013
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __xfs_dir3_data_check() function in fs/xfs/libxfs/xfs_dir2_data.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94836
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41014
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the xlog_recover_process_data() function in fs/xfs/xfs_log_recover.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41015
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94837
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41016
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ocfs2_xattr_find_entry() function in fs/ocfs2/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41017
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __jfs_getxattr() and jfs_listxattr() functions in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94949
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41040
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sched/act_ct.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95069
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41041
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sock_set_flag() and spin_unlock() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95108
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41044
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ppp_read() and ppp_write() functions in drivers/net/ppp/ppp_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41048
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sk_msg_recvmsg() function in net/core/skmsg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94945
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_free_volume() function in fs/cachefiles/volume.c, within the cachefiles_withdraw_objects() and cachefiles_withdraw_cache() functions in fs/cachefiles/cache.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94944
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41058
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cachefiles_withdraw_volumes() function in fs/cachefiles/cache.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41059
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94992
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41063
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the hci_unregister_dev() function in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94991
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41064
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the eeh_pe_bus_get() function in arch/powerpc/kernel/eeh_pe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94927
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41066
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ibmvnic_xmit() function in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94943
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41069
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the soc_tplg_dapm_graph_elems_load() function in sound/soc/soc-topology.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94942
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41070
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the kvm_spapr_tce_attach_iommu_group() function in arch/powerpc/kvm/book3s_64_vio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94956
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41071
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ieee80211_prep_hw_scan() function in net/mac80211/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95106
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41072
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_wext_siwscan() function in net/wireless/scan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94928
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41076
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nfs4_set_security_label() function in fs/nfs/nfs4proc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94929
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41078
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the btrfs_quota_disable() function in fs/btrfs/qgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95051
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41081
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ila_output() function in net/ipv6/ila/ila_lwt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95008
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41087
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the ata_host_alloc() function in drivers/ata/libata-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94840
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41090
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tap_get_user_xdp() function in drivers/net/tap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41091
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the tun_xdp_one() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94923
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42070
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a type confusion error within the nft_lookup_init() function in net/netfilter/nft_lookup.c,
within the nf_tables_fill_setelem() and nft_validate_register_store()
functions in net/netfilter/nf_tables_api.c. A local user can pass specially crafted data to the packet filtering to trigger a type confusion error and gain access to sensitive information.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94968
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42079
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gfs2_jindex_free() function in fs/gfs2/super.c, within the lops_before_commit() function in fs/gfs2/log.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95039
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42093
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the dpaa2_eth_xdp_xmit() and update_xps() functions in drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42096
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the profile_pc() function in arch/x86/kernel/time.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94936
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42105
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_store_disk_layout() function in fs/nilfs2/the_nilfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94961
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42122
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn351/dcn351_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn35/dcn35_resource.c, within the dcn321_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn321/dcn321_resource.c, within the dcn32_hpo_dp_link_encoder_create() and dml1_validate() functions in drivers/gpu/drm/amd/display/dc/resource/dcn32/dcn32_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn316/dcn316_resource.c, within the dcn31_hpo_dp_link_encoder_create() function in drivers/gpu/drm/amd/display/dc/resource/dcn315/dcn315_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn314_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn314/dcn314_resource.c, within the dcn31_hpo_dp_link_encoder_create() and dcn31_validate_bandwidth() functions in drivers/gpu/drm/amd/display/dc/resource/dcn31/dcn31_resource.c, within the dcn30_validate_bandwidth() function in drivers/gpu/drm/amd/display/dc/resource/dcn30/dcn30_resource.c, within the dcn32_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn32/dcn32_clk_mgr.c, within the dcn3_clk_mgr_construct() function in drivers/gpu/drm/amd/display/dc/clk_mgr/dcn30/dcn30_clk_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95097
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42124
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qedf_execute_tmf() function in drivers/scsi/qedf/qedf_io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95054
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42145
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the MODULE_AUTHOR(), __get_agent(), send_handler(), recv_handler() and ib_umad_read() functions in drivers/infiniband/core/user_mad.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42161
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the tools/lib/bpf/bpf_core_read.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95012
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42224
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the mv88e6xxx_default_mdio_bus() function in drivers/net/dsa/mv88e6xxx/chip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU95062
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42230
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the define_machine() function in arch/powerpc/platforms/pseries/setup.c, within the pseries_kexec_cpu_down() function in arch/powerpc/platforms/pseries/kexec.c, within the default_machine_kexec() function in arch/powerpc/kexec/core_64.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsopenSUSE Leap Micro: 5.5
SUSE Linux Enterprise Micro: 5.5
SUSE Real Time Module: 15-SP5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug: before 5.14.21-150500.13.64.1
kernel-rt-vdso: before 5.14.21-150500.13.64.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt: before 1-150500.11.3.1
kernel-rt-extra: before 5.14.21-150500.13.64.1
kernel-syms-rt: before 5.14.21-150500.13.64.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.64.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debugsource: before 5.14.21-150500.13.64.1
kernel-rt-optional: before 5.14.21-150500.13.64.1
dlm-kmp-rt: before 5.14.21-150500.13.64.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.64.1
kernel-rt_debug-livepatch-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt: before 5.14.21-150500.13.64.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.64.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.64.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-devel: before 5.14.21-150500.13.64.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.64.1
reiserfs-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-5_14_21-150500_13_64-rt-debuginfo: before 1-150500.11.3.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.64.1
gfs2-kmp-rt: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt: before 5.14.21-150500.13.64.1
kernel-livepatch-SLE15-SP5-RT_Update_18-debugsource: before 1-150500.11.3.1
kernel-rt_debug-devel: before 5.14.21-150500.13.64.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.64.1
kernel-rt-livepatch: before 5.14.21-150500.13.64.1
kernel-devel-rt: before 5.14.21-150500.13.64.1
kernel-source-rt: before 5.14.21-150500.13.64.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.