Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 783 |
CVE-ID | CVE-2021-47432 CVE-2022-48772 CVE-2023-0160 CVE-2023-38417 CVE-2023-47210 CVE-2023-51780 CVE-2023-52435 CVE-2023-52458 CVE-2023-52472 CVE-2023-52503 CVE-2023-52616 CVE-2023-52618 CVE-2023-52622 CVE-2023-52631 CVE-2023-52635 CVE-2023-52640 CVE-2023-52641 CVE-2023-52645 CVE-2023-52652 CVE-2023-52653 CVE-2023-52656 CVE-2023-52657 CVE-2023-52658 CVE-2023-52659 CVE-2023-52660 CVE-2023-52661 CVE-2023-52662 CVE-2023-52663 CVE-2023-52664 CVE-2023-52667 CVE-2023-52669 CVE-2023-52670 CVE-2023-52671 CVE-2023-52672 CVE-2023-52673 CVE-2023-52674 CVE-2023-52675 CVE-2023-52676 CVE-2023-52678 CVE-2023-52679 CVE-2023-52680 CVE-2023-52681 CVE-2023-52683 CVE-2023-52685 CVE-2023-52686 CVE-2023-52687 CVE-2023-52690 CVE-2023-52691 CVE-2023-52692 CVE-2023-52693 CVE-2023-52694 CVE-2023-52695 CVE-2023-52696 CVE-2023-52697 CVE-2023-52698 CVE-2023-52699 CVE-2023-52735 CVE-2023-52749 CVE-2023-52750 CVE-2023-52751 CVE-2023-52753 CVE-2023-52754 CVE-2023-52757 CVE-2023-52759 CVE-2023-52762 CVE-2023-52763 CVE-2023-52764 CVE-2023-52765 CVE-2023-52766 CVE-2023-52767 CVE-2023-52768 CVE-2023-52769 CVE-2023-52771 CVE-2023-52772 CVE-2023-52773 CVE-2023-52774 CVE-2023-52775 CVE-2023-52776 CVE-2023-52777 CVE-2023-52780 CVE-2023-52781 CVE-2023-52782 CVE-2023-52783 CVE-2023-52784 CVE-2023-52786 CVE-2023-52787 CVE-2023-52788 CVE-2023-52789 CVE-2023-52791 CVE-2023-52792 CVE-2023-52794 CVE-2023-52795 CVE-2023-52796 CVE-2023-52798 CVE-2023-52799 CVE-2023-52800 CVE-2023-52801 CVE-2023-52803 CVE-2023-52804 CVE-2023-52805 CVE-2023-52806 CVE-2023-52807 CVE-2023-52808 CVE-2023-52809 CVE-2023-52810 CVE-2023-52811 CVE-2023-52812 CVE-2023-52813 CVE-2023-52814 CVE-2023-52815 CVE-2023-52816 CVE-2023-52817 CVE-2023-52818 CVE-2023-52819 CVE-2023-52821 CVE-2023-52825 CVE-2023-52826 CVE-2023-52827 CVE-2023-52829 CVE-2023-52832 CVE-2023-52833 CVE-2023-52834 CVE-2023-52835 CVE-2023-52836 CVE-2023-52837 CVE-2023-52838 CVE-2023-52840 CVE-2023-52841 CVE-2023-52842 CVE-2023-52843 CVE-2023-52844 CVE-2023-52845 CVE-2023-52847 CVE-2023-52849 CVE-2023-52850 CVE-2023-52851 CVE-2023-52853 CVE-2023-52854 CVE-2023-52855 CVE-2023-52856 CVE-2023-52857 CVE-2023-52858 CVE-2023-52860 CVE-2023-52861 CVE-2023-52862 CVE-2023-52863 CVE-2023-52864 CVE-2023-52865 CVE-2023-52866 CVE-2023-52867 CVE-2023-52868 CVE-2023-52869 CVE-2023-52870 CVE-2023-52871 CVE-2023-52872 CVE-2023-52873 CVE-2023-52874 CVE-2023-52875 CVE-2023-52876 CVE-2023-52877 CVE-2023-52878 CVE-2023-52879 CVE-2023-52880 CVE-2023-52881 CVE-2023-52882 CVE-2023-52883 CVE-2023-52884 CVE-2023-6238 CVE-2023-7042 CVE-2024-0639 CVE-2024-21823 CVE-2024-22099 CVE-2024-23848 CVE-2024-24861 CVE-2024-25739 CVE-2024-25741 CVE-2024-26601 CVE-2024-26611 CVE-2024-26614 CVE-2024-26615 CVE-2024-26623 CVE-2024-26625 CVE-2024-26632 CVE-2024-26633 CVE-2024-26635 CVE-2024-26636 CVE-2024-26638 CVE-2024-26641 CVE-2024-26642 CVE-2024-26643 CVE-2024-26650 CVE-2024-26652 CVE-2024-26654 CVE-2024-26656 CVE-2024-26657 CVE-2024-26663 CVE-2024-26665 CVE-2024-26671 CVE-2024-26673 CVE-2024-26674 CVE-2024-26676 CVE-2024-26679 CVE-2024-26684 CVE-2024-26685 CVE-2024-26691 CVE-2024-26704 CVE-2024-26714 CVE-2024-26726 CVE-2024-26731 CVE-2024-26733 CVE-2024-26734 CVE-2024-26737 CVE-2024-26739 CVE-2024-26740 CVE-2024-26742 CVE-2024-26750 CVE-2024-26756 CVE-2024-26758 CVE-2024-26760 CVE-2024-26761 CVE-2024-26764 CVE-2024-26767 CVE-2024-26769 CVE-2024-26772 CVE-2024-26773 CVE-2024-26774 CVE-2024-26775 CVE-2024-26780 CVE-2024-26783 CVE-2024-26785 CVE-2024-26786 CVE-2024-26791 CVE-2024-26793 CVE-2024-26794 CVE-2024-26802 CVE-2024-26805 CVE-2024-26807 CVE-2024-26813 CVE-2024-26814 CVE-2024-26815 CVE-2024-26816 CVE-2024-26822 CVE-2024-26826 CVE-2024-26832 CVE-2024-26836 CVE-2024-26842 CVE-2024-26844 CVE-2024-26845 CVE-2024-26846 CVE-2024-26853 CVE-2024-26854 CVE-2024-26855 CVE-2024-26856 CVE-2024-26857 CVE-2024-26858 CVE-2024-26860 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26866 CVE-2024-26868 CVE-2024-26870 CVE-2024-26878 CVE-2024-26881 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26889 CVE-2024-26899 CVE-2024-26900 CVE-2024-26901 CVE-2024-26903 CVE-2024-26906 CVE-2024-26909 CVE-2024-26920 CVE-2024-26921 CVE-2024-26922 CVE-2024-26923 CVE-2024-26925 CVE-2024-26928 CVE-2024-26932 CVE-2024-26933 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26938 CVE-2024-26940 CVE-2024-26943 CVE-2024-26944 CVE-2024-26945 CVE-2024-26946 CVE-2024-26948 CVE-2024-26949 CVE-2024-26950 CVE-2024-26951 CVE-2024-26957 CVE-2024-26958 CVE-2024-26960 CVE-2024-26961 CVE-2024-26962 CVE-2024-26963 CVE-2024-26964 CVE-2024-26972 CVE-2024-26973 CVE-2024-26978 CVE-2024-26981 CVE-2024-26982 CVE-2024-26983 CVE-2024-26984 CVE-2024-26986 CVE-2024-26988 CVE-2024-26989 CVE-2024-26990 CVE-2024-26991 CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26995 CVE-2024-26996 CVE-2024-26997 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27008 CVE-2024-27012 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015 CVE-2024-27016 CVE-2024-27019 CVE-2024-27020 CVE-2024-27022 CVE-2024-27025 CVE-2024-27027 CVE-2024-27028 CVE-2024-27030 CVE-2024-27031 CVE-2024-27046 CVE-2024-27056 CVE-2024-27057 CVE-2024-27062 CVE-2024-27064 CVE-2024-27065 CVE-2024-27067 CVE-2024-27080 CVE-2024-27388 CVE-2024-27389 CVE-2024-27393 CVE-2024-27395 CVE-2024-27396 CVE-2024-27399 CVE-2024-27400 CVE-2024-27401 CVE-2024-27402 CVE-2024-27404 CVE-2024-27405 CVE-2024-27408 CVE-2024-27410 CVE-2024-27411 CVE-2024-27412 CVE-2024-27413 CVE-2024-27414 CVE-2024-27416 CVE-2024-27417 CVE-2024-27418 CVE-2024-27419 CVE-2024-27431 CVE-2024-27432 CVE-2024-27434 CVE-2024-27435 CVE-2024-27436 CVE-2024-33619 CVE-2024-34777 CVE-2024-35247 CVE-2024-35784 CVE-2024-35786 CVE-2024-35788 CVE-2024-35789 CVE-2024-35790 CVE-2024-35791 CVE-2024-35794 CVE-2024-35795 CVE-2024-35796 CVE-2024-35799 CVE-2024-35800 CVE-2024-35801 CVE-2024-35803 CVE-2024-35804 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35808 CVE-2024-35809 CVE-2024-35810 CVE-2024-35811 CVE-2024-35812 CVE-2024-35813 CVE-2024-35814 CVE-2024-35815 CVE-2024-35817 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35823 CVE-2024-35824 CVE-2024-35825 CVE-2024-35827 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35831 CVE-2024-35833 CVE-2024-35834 CVE-2024-35835 CVE-2024-35836 CVE-2024-35837 CVE-2024-35838 CVE-2024-35841 CVE-2024-35842 CVE-2024-35843 CVE-2024-35845 CVE-2024-35847 CVE-2024-35848 CVE-2024-35849 CVE-2024-35850 CVE-2024-35851 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35857 CVE-2024-35860 CVE-2024-35861 CVE-2024-35862 CVE-2024-35863 CVE-2024-35864 CVE-2024-35865 CVE-2024-35866 CVE-2024-35867 CVE-2024-35868 CVE-2024-35872 CVE-2024-35875 CVE-2024-35877 CVE-2024-35878 CVE-2024-35879 CVE-2024-35880 CVE-2024-35883 CVE-2024-35884 CVE-2024-35885 CVE-2024-35886 CVE-2024-35887 CVE-2024-35889 CVE-2024-35890 CVE-2024-35891 CVE-2024-35892 CVE-2024-35893 CVE-2024-35895 CVE-2024-35896 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35901 CVE-2024-35903 CVE-2024-35904 CVE-2024-35905 CVE-2024-35907 CVE-2024-35908 CVE-2024-35909 CVE-2024-35911 CVE-2024-35912 CVE-2024-35914 CVE-2024-35915 CVE-2024-35916 CVE-2024-35917 CVE-2024-35921 CVE-2024-35922 CVE-2024-35924 CVE-2024-35925 CVE-2024-35926 CVE-2024-35927 CVE-2024-35928 CVE-2024-35930 CVE-2024-35931 CVE-2024-35932 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35937 CVE-2024-35938 CVE-2024-35940 CVE-2024-35942 CVE-2024-35943 CVE-2024-35944 CVE-2024-35945 CVE-2024-35946 CVE-2024-35947 CVE-2024-35950 CVE-2024-35951 CVE-2024-35952 CVE-2024-35953 CVE-2024-35954 CVE-2024-35955 CVE-2024-35956 CVE-2024-35957 CVE-2024-35958 CVE-2024-35959 CVE-2024-35960 CVE-2024-35961 CVE-2024-35962 CVE-2024-35963 CVE-2024-35964 CVE-2024-35965 CVE-2024-35966 CVE-2024-35967 CVE-2024-35969 CVE-2024-35970 CVE-2024-35971 CVE-2024-35972 CVE-2024-35973 CVE-2024-35974 CVE-2024-35975 CVE-2024-35976 CVE-2024-35977 CVE-2024-35978 CVE-2024-35979 CVE-2024-35981 CVE-2024-35982 CVE-2024-35984 CVE-2024-35986 CVE-2024-35989 CVE-2024-35990 CVE-2024-35991 CVE-2024-35992 CVE-2024-35995 CVE-2024-35997 CVE-2024-35998 CVE-2024-35999 CVE-2024-36002 CVE-2024-36003 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36009 CVE-2024-36010 CVE-2024-36011 CVE-2024-36012 CVE-2024-36013 CVE-2024-36014 CVE-2024-36015 CVE-2024-36016 CVE-2024-36017 CVE-2024-36018 CVE-2024-36019 CVE-2024-36020 CVE-2024-36021 CVE-2024-36024 CVE-2024-36025 CVE-2024-36026 CVE-2024-36029 CVE-2024-36030 CVE-2024-36032 CVE-2024-36281 CVE-2024-36477 CVE-2024-36478 CVE-2024-36479 CVE-2024-36880 CVE-2024-36882 CVE-2024-36885 CVE-2024-36887 CVE-2024-36889 CVE-2024-36890 CVE-2024-36891 CVE-2024-36893 CVE-2024-36894 CVE-2024-36895 CVE-2024-36896 CVE-2024-36897 CVE-2024-36898 CVE-2024-36899 CVE-2024-36900 CVE-2024-36901 CVE-2024-36902 CVE-2024-36903 CVE-2024-36904 CVE-2024-36906 CVE-2024-36909 CVE-2024-36910 CVE-2024-36911 CVE-2024-36912 CVE-2024-36913 CVE-2024-36914 CVE-2024-36915 CVE-2024-36916 CVE-2024-36917 CVE-2024-36918 CVE-2024-36919 CVE-2024-36921 CVE-2024-36922 CVE-2024-36923 CVE-2024-36924 CVE-2024-36926 CVE-2024-36928 CVE-2024-36930 CVE-2024-36931 CVE-2024-36934 CVE-2024-36935 CVE-2024-36936 CVE-2024-36937 CVE-2024-36938 CVE-2024-36940 CVE-2024-36942 CVE-2024-36944 CVE-2024-36945 CVE-2024-36946 CVE-2024-36947 CVE-2024-36949 CVE-2024-36950 CVE-2024-36951 CVE-2024-36952 CVE-2024-36955 CVE-2024-36957 CVE-2024-36959 CVE-2024-36960 CVE-2024-36962 CVE-2024-36964 CVE-2024-36965 CVE-2024-36967 CVE-2024-36969 CVE-2024-36971 CVE-2024-36972 CVE-2024-36973 CVE-2024-36975 CVE-2024-36977 CVE-2024-36978 CVE-2024-37021 CVE-2024-37078 CVE-2024-37353 CVE-2024-37354 CVE-2024-38381 CVE-2024-38384 CVE-2024-38385 CVE-2024-38388 CVE-2024-38390 CVE-2024-38391 CVE-2024-38539 CVE-2024-38540 CVE-2024-38541 CVE-2024-38543 CVE-2024-38544 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548 CVE-2024-38549 CVE-2024-38550 CVE-2024-38551 CVE-2024-38552 CVE-2024-38553 CVE-2024-38554 CVE-2024-38555 CVE-2024-38556 CVE-2024-38557 CVE-2024-38558 CVE-2024-38562 CVE-2024-38564 CVE-2024-38565 CVE-2024-38566 CVE-2024-38567 CVE-2024-38568 CVE-2024-38569 CVE-2024-38570 CVE-2024-38571 CVE-2024-38572 CVE-2024-38573 CVE-2024-38575 CVE-2024-38578 CVE-2024-38579 CVE-2024-38580 CVE-2024-38581 CVE-2024-38582 CVE-2024-38583 CVE-2024-38586 CVE-2024-38587 CVE-2024-38588 CVE-2024-38590 CVE-2024-38591 CVE-2024-38592 CVE-2024-38594 CVE-2024-38595 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599 CVE-2024-38600 CVE-2024-38601 CVE-2024-38602 CVE-2024-38603 CVE-2024-38604 CVE-2024-38605 CVE-2024-38608 CVE-2024-38610 CVE-2024-38611 CVE-2024-38615 CVE-2024-38616 CVE-2024-38617 CVE-2024-38618 CVE-2024-38619 CVE-2024-38621 CVE-2024-38622 CVE-2024-38627 CVE-2024-38628 CVE-2024-38629 CVE-2024-38630 CVE-2024-38633 CVE-2024-38634 CVE-2024-38635 CVE-2024-38636 CVE-2024-38659 CVE-2024-38661 CVE-2024-38663 CVE-2024-38664 CVE-2024-38780 CVE-2024-39276 CVE-2024-39277 CVE-2024-39291 CVE-2024-39296 CVE-2024-39301 CVE-2024-39362 CVE-2024-39371 CVE-2024-39463 CVE-2024-39466 CVE-2024-39468 CVE-2024-39469 CVE-2024-39471 CVE-2024-39472 CVE-2024-39473 CVE-2024-39474 CVE-2024-39475 CVE-2024-39479 CVE-2024-39481 CVE-2024-39482 CVE-2024-39487 CVE-2024-39490 CVE-2024-39494 CVE-2024-39496 CVE-2024-39498 CVE-2024-39502 CVE-2024-39504 CVE-2024-39507 CVE-2024-40901 CVE-2024-40906 CVE-2024-40908 CVE-2024-40919 CVE-2024-40923 CVE-2024-40925 CVE-2024-40928 CVE-2024-40931 CVE-2024-40935 CVE-2024-40937 CVE-2024-40940 CVE-2024-40947 CVE-2024-40948 CVE-2024-40953 CVE-2024-40960 CVE-2024-40961 CVE-2024-40966 CVE-2024-40970 CVE-2024-40972 CVE-2024-40975 CVE-2024-40979 CVE-2024-40998 CVE-2024-40999 CVE-2024-41006 CVE-2024-41011 CVE-2024-41013 CVE-2024-41014 CVE-2024-41017 CVE-2024-41090 CVE-2024-41091 |
CWE-ID | CWE-190 CWE-476 CWE-667 CWE-20 CWE-362 CWE-119 CWE-416 CWE-665 CWE-125 CWE-200 CWE-401 CWE-477 CWE-388 CWE-415 CWE-191 CWE-908 CWE-399 CWE-617 CWE-682 CWE-264 CWE-451 CWE-120 CWE-502 CWE-754 CWE-824 CWE-284 CWE-833 CWE-835 CWE-369 CWE-404 CWE-366 CWE-193 CWE-787 CWE-252 CWE-269 |
Exploitation vector | Network |
Public exploit | Vulnerability #635 is being exploited in the wild. |
Vulnerable software |
SUSE Real Time Module Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-6_4_0-150600_10_5-rt Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource Operating systems & Components / Operating system package or component kernel-rt Operating systems & Components / Operating system package or component kernel-rt_debug Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component kernel-syms-rt Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-livepatch-devel Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 783 vulnerabilities.
EUVDB-ID: #VU91179
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47432
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the __genradix_iter_peek() function in lib/generic-radix-tree.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93327
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48772
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lgdt3306a_probe() function in drivers/media/dvb-frontends/lgdt3306a.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90810
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-0160
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __sock_map_delete() and sock_hash_delete_elem() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96264
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-38417
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can send specially crafted packets to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96262
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-47210
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can send specially crafted packets to the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85024
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-51780
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in the ATM (Asynchronous Transfer Mode) subsystem in Linux kernel. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87748
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52435
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error within the skb_segment() function. A local user can trigger memory corruption and crash the kernel.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90657
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52458
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the blkpg_do_ioctl() function in block/ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52472
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rsa_check_exponent_fips() function in crypto/rsa.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90234
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52503
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the destroy_session(), amdtee_open_session() and amdtee_close_session() functions in drivers/tee/amdtee/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91556
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52616
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93617
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52618
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the rnbd_srv_get_full_path() function in drivers/block/rnbd/rnbd-srv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93471
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52622
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the alloc_flex_gd() and ext4_setup_next_flex_gd() functions in fs/ext4/resize.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91240
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52631
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fs/ntfs3/ntfs_fs.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92045
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52635
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the devfreq_monitor(), devfreq_monitor_start() and devfreq_monitor_stop() functions in drivers/devfreq/devfreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90331
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52640
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ntfs_list_ea() function in fs/ntfs3/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90592
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52641
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ni_find_attr() and run_truncate_around() functions in fs/ntfs3/attrib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91477
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52645
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the scpsys_add_subdomain() and scpsys_remove_one_domain() functions in drivers/soc/mediatek/mtk-pm-domains.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91353
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52652
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the pci_vntb_probe() function in drivers/pci/endpoint/functions/pci-epf-vntb.c, within the EXPORT_SYMBOL() and ntb_register_device() functions in drivers/ntb/core.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90459
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52653
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gss_import_v2_context() function in net/sunrpc/auth_gss/gss_krb5_mech.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93856
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52656
CWE-ID:
CWE-477 - Use of Obsolete Function
Exploit availability: No
DescriptionThe vulnerability allows a local user to have negative impact on system performance.
The vulnerability exists due to usage of dead code related to SCM_RIGHTS within the io_allocate_scq_urings(), io_ring_ctx_free(), and io_cqring_wait() function in fs/io_uring.c. A local user can influence system performance.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92943
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52657
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the si_dpm_enable() and si_dpm_process_interrupt() functions in drivers/gpu/drm/amd/pm/legacy-dpm/si_dpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93683
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52658
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the esw_inline_mode_to_devlink() and mlx5_devlink_eswitch_mode_set() functions in drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93682
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52659
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the arch/x86/include/asm/page.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92057
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52660
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the rkisp1_isp_isr() function in drivers/media/platform/rockchip/rkisp1/rkisp1-isp.c, within the rkisp1_runtime_suspend() and rkisp1_runtime_resume() functions in drivers/media/platform/rockchip/rkisp1/rkisp1-dev.c, within the rkisp1_csi_isr() function in drivers/media/platform/rockchip/rkisp1/rkisp1-csi.c, within the rkisp1_capture_isr() function in drivers/media/platform/rockchip/rkisp1/rkisp1-capture.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90948
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52661
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the tegra_dc_rgb_probe() function in drivers/gpu/drm/tegra/rgb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90444
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52662
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vmw_gmrid_man_get_node() function in drivers/gpu/drm/vmwgfx/vmwgfx_gmrid_manager.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52663
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the amd_sof_acp_probe() function in sound/soc/sof/amd/acp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90893
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52664
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the aq_vec_ring_alloc() function in drivers/net/ethernet/aquantia/atlantic/aq_vec.c, within the aq_get_rxpages(), aq_ring_alloc(), aq_ring_rx_alloc() and aq_ring_hwts_rx_alloc() functions in drivers/net/ethernet/aquantia/atlantic/aq_ring.c, within the aq_ptp_ring_alloc() function in drivers/net/ethernet/aquantia/atlantic/aq_ptp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90922
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52667
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the fs_any_create_groups() function in drivers/net/ethernet/mellanox/mlx5/core/en/fs_tt_redirect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91423
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52669
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ctr_paes_crypt() function in arch/s390/crypto/paes_s390.c, within the ctr_aes_crypt() function in arch/s390/crypto/aes_s390.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89988
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52670
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the virtio_rpmsg_release_device() function in drivers/rpmsg/virtio_rpmsg_bus.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91668
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52671
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the optc32_disable_crtc() function in drivers/gpu/drm/amd/display/dc/dcn32/dcn32_optc.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92024
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52672
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the pipe_resize_ring() and pipe_set_size() functions in fs/pipe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90552
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52673
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the capabilities_show() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91392
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52674
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the scarlett2_mixer_ctl_put() function in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90547
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52675
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the update_events_in_group() function in arch/powerpc/perf/imc-pmu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93061
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52676
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the check_ptr_to_map_access() and check_stack_access_within_bounds() functions in kernel/bpf/verifier.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93452
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52678
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the kfd_create_indirect_link_prop() and kfd_add_peer_prop() functions in drivers/gpu/drm/amd/amdkfd/kfd_topology.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90892
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52679
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the of_unittest_parse_phandle_with_args() and of_unittest_parse_phandle_with_args_map() functions in drivers/of/unittest.c, within the of_parse_phandle_with_args_map() function in drivers/of/base.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93618
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52680
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the scarlett2_sync_ctl_get(), scarlett2_master_volume_ctl_get(), scarlett2_volume_ctl_get(), scarlett2_mute_ctl_get(), scarlett2_level_enum_ctl_get(), scarlett2_pad_ctl_get(), scarlett2_air_ctl_get(), scarlett2_phantom_ctl_get(), scarlett2_direct_monitor_ctl_get(), scarlett2_speaker_switch_enum_ctl_get(), scarlett2_talkback_enum_ctl_get(), scarlett2_dim_mute_ctl_get() and scarlett2_mux_src_enum_ctl_get() functions in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93768
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52681
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the efivarfs_init_fs_context() function in fs/efivarfs/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91424
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52683
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the lpit_update_residency() function in drivers/acpi/acpi_lpit.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91437
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52685
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the persistent_ram_init_ecc() function in fs/pstore/ram_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52686
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the opal_event_init() function in arch/powerpc/platforms/powernv/opal-irqchip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90945
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52687
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the safexcel_send_req() function in drivers/crypto/inside-secure/safexcel_cipher.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89981
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52690
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the scom_debug_init_one() function in arch/powerpc/platforms/powernv/opal-xscom.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90921
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52691
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the si_dpm_init() function in drivers/gpu/drm/amd/amdgpu/si_dpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93619
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52692
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the scarlett2_usb_set_config() function in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91678
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52693
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the acpi_video_dev_register_backlight() function in drivers/acpi/acpi_video.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91606
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52694
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the tpd12s015_probe() function in drivers/gpu/drm/bridge/ti-tpd12s015.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90549
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52695
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the create_validate_stream_for_sink() and dm_update_crtc_state() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90550
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52696
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the opal_powercap_init() function in arch/powerpc/platforms/powernv/opal-powercap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94127
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52697
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sof_sdw_rt_sdca_jack_exit() function in sound/soc/intel/boards/sof_sdw_rt_sdca_jack_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89982
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52698
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the netlbl_calipso_ops_register(), netlbl_calipso_add_pass() and netlbl_calipso_genl_init() functions in net/netlabel/netlabel_calipso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90751
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52699
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the block_end(), get_branch(), get_block() and find_shared() functions in fs/sysv/itree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91621
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52735
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sock_map_unhash(), sock_map_destroy() and sock_map_close() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90534
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52749
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the spi_unregister_controller(), __spi_transfer_message_noqueue() and __spi_sync() functions in drivers/spi/spi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90935
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52750
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the arch/arm64/Kconfig. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90063
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52751
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the find_or_create_cached_dir(), spin_unlock() and open_cached_dir() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91226
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52753
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dc_stream_get_vblank_counter() and dc_stream_get_scanoutpos() functions in drivers/gpu/drm/amd/display/dc/core/dc_stream.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90854
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52754
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the imon_probe() function in drivers/media/rc/imon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90069
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52757
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the alloc_mid() function in fs/smb/client/transport.c, within the __smb2_handle_cancelled_cmd() function in fs/smb/client/smb2misc.c, within the cifs_compose_mount_options(), __release_mid() and cifs_get_tcon_super() functions in fs/smb/client/cifsproto.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90905
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52759
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the qd_check_sync() function in fs/gfs2/quota.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93622
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52762
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the virtblk_probe() function in drivers/block/virtio_blk.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93590
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52763
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the hci_dat_v1_init(), hci_dat_v1_cleanup() and hci_dat_v1_free_entry() functions in drivers/i3c/master/mipi-i3c-hci/dat_v1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52764
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the set_flicker() function in drivers/media/usb/gspca/cpia1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90838
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52765
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the DEFINE_MUTEX(), qcom_pmic_get_base_usid(), qcom_pmic_get() and pmic_spmi_probe() functions in drivers/mfd/qcom-spmi-pmic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52766
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hci_dma_irq_handler() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93261
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52767
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tls_sw_splice_eof() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89837
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52768
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition within the wilc_wlan_init() function in drivers/net/wireless/microchip/wilc1000/wlan.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90070
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52769
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ath12k_htt_mlo_offset_event_handler() function in drivers/net/wireless/ath/ath12k/dp_rx.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90066
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52771
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the grandparent() function in drivers/cxl/core/port.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90073
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52772
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unix_stream_recv_urg() function in net/unix/af_unix.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90418
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52773
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amdgpu_dm_i2c_xfer() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP6
SUSE Linux Enterprise Live Patching: 15-SP6
SUSE Linux Enterprise Real Time 15: SP6
openSUSE Leap: 15.6
SUSE Linux Enterprise Server for SAP Applications 15: SP6
SUSE Linux Enterprise Server 15: SP6
kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1
kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1
kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1
kernel-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug: before 6.4.0-150600.10.5.1
kernel-source-rt: before 6.4.0-150600.10.5.1
kernel-devel-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-optional: before 6.4.0-150600.10.5.1
kernel-syms-rt: before 6.4.0-150600.10.5.1
kernel-rt-debugsource: before 6.4.0-150600.10.5.1
dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-extra: before 6.4.0-150600.10.5.1
dlm-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1
kselftests-kmp-rt: before 6.4.0-150600.10.5.1
ocfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel: before 6.4.0-150600.10.5.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt-vdso: before 6.4.0-150600.10.5.1
kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1
kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1
kernel-rt_debug-devel: before 6.4.0-150600.10.5.1
cluster-md-kmp-rt: before 6.4.0-150600.10.5.1
reiserfs-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1
kernel-rt-debuginfo: before 6.4.0-150600.10.5.1
gfs2-kmp-rt: before 6.4.0-150600.10.5.1
kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1
CPE2.3