SUSE update for the Linux Kernel



Risk Critical
Patch available YES
Number of vulnerabilities 783
CVE-ID CVE-2021-47432
CVE-2022-48772
CVE-2023-0160
CVE-2023-38417
CVE-2023-47210
CVE-2023-51780
CVE-2023-52435
CVE-2023-52458
CVE-2023-52472
CVE-2023-52503
CVE-2023-52616
CVE-2023-52618
CVE-2023-52622
CVE-2023-52631
CVE-2023-52635
CVE-2023-52640
CVE-2023-52641
CVE-2023-52645
CVE-2023-52652
CVE-2023-52653
CVE-2023-52656
CVE-2023-52657
CVE-2023-52658
CVE-2023-52659
CVE-2023-52660
CVE-2023-52661
CVE-2023-52662
CVE-2023-52663
CVE-2023-52664
CVE-2023-52667
CVE-2023-52669
CVE-2023-52670
CVE-2023-52671
CVE-2023-52672
CVE-2023-52673
CVE-2023-52674
CVE-2023-52675
CVE-2023-52676
CVE-2023-52678
CVE-2023-52679
CVE-2023-52680
CVE-2023-52681
CVE-2023-52683
CVE-2023-52685
CVE-2023-52686
CVE-2023-52687
CVE-2023-52690
CVE-2023-52691
CVE-2023-52692
CVE-2023-52693
CVE-2023-52694
CVE-2023-52695
CVE-2023-52696
CVE-2023-52697
CVE-2023-52698
CVE-2023-52699
CVE-2023-52735
CVE-2023-52749
CVE-2023-52750
CVE-2023-52751
CVE-2023-52753
CVE-2023-52754
CVE-2023-52757
CVE-2023-52759
CVE-2023-52762
CVE-2023-52763
CVE-2023-52764
CVE-2023-52765
CVE-2023-52766
CVE-2023-52767
CVE-2023-52768
CVE-2023-52769
CVE-2023-52771
CVE-2023-52772
CVE-2023-52773
CVE-2023-52774
CVE-2023-52775
CVE-2023-52776
CVE-2023-52777
CVE-2023-52780
CVE-2023-52781
CVE-2023-52782
CVE-2023-52783
CVE-2023-52784
CVE-2023-52786
CVE-2023-52787
CVE-2023-52788
CVE-2023-52789
CVE-2023-52791
CVE-2023-52792
CVE-2023-52794
CVE-2023-52795
CVE-2023-52796
CVE-2023-52798
CVE-2023-52799
CVE-2023-52800
CVE-2023-52801
CVE-2023-52803
CVE-2023-52804
CVE-2023-52805
CVE-2023-52806
CVE-2023-52807
CVE-2023-52808
CVE-2023-52809
CVE-2023-52810
CVE-2023-52811
CVE-2023-52812
CVE-2023-52813
CVE-2023-52814
CVE-2023-52815
CVE-2023-52816
CVE-2023-52817
CVE-2023-52818
CVE-2023-52819
CVE-2023-52821
CVE-2023-52825
CVE-2023-52826
CVE-2023-52827
CVE-2023-52829
CVE-2023-52832
CVE-2023-52833
CVE-2023-52834
CVE-2023-52835
CVE-2023-52836
CVE-2023-52837
CVE-2023-52838
CVE-2023-52840
CVE-2023-52841
CVE-2023-52842
CVE-2023-52843
CVE-2023-52844
CVE-2023-52845
CVE-2023-52847
CVE-2023-52849
CVE-2023-52850
CVE-2023-52851
CVE-2023-52853
CVE-2023-52854
CVE-2023-52855
CVE-2023-52856
CVE-2023-52857
CVE-2023-52858
CVE-2023-52860
CVE-2023-52861
CVE-2023-52862
CVE-2023-52863
CVE-2023-52864
CVE-2023-52865
CVE-2023-52866
CVE-2023-52867
CVE-2023-52868
CVE-2023-52869
CVE-2023-52870
CVE-2023-52871
CVE-2023-52872
CVE-2023-52873
CVE-2023-52874
CVE-2023-52875
CVE-2023-52876
CVE-2023-52877
CVE-2023-52878
CVE-2023-52879
CVE-2023-52880
CVE-2023-52881
CVE-2023-52882
CVE-2023-52883
CVE-2023-52884
CVE-2023-6238
CVE-2023-7042
CVE-2024-0639
CVE-2024-21823
CVE-2024-22099
CVE-2024-23848
CVE-2024-24861
CVE-2024-25739
CVE-2024-25741
CVE-2024-26601
CVE-2024-26611
CVE-2024-26614
CVE-2024-26615
CVE-2024-26623
CVE-2024-26625
CVE-2024-26632
CVE-2024-26633
CVE-2024-26635
CVE-2024-26636
CVE-2024-26638
CVE-2024-26641
CVE-2024-26642
CVE-2024-26643
CVE-2024-26650
CVE-2024-26652
CVE-2024-26654
CVE-2024-26656
CVE-2024-26657
CVE-2024-26663
CVE-2024-26665
CVE-2024-26671
CVE-2024-26673
CVE-2024-26674
CVE-2024-26676
CVE-2024-26679
CVE-2024-26684
CVE-2024-26685
CVE-2024-26691
CVE-2024-26704
CVE-2024-26714
CVE-2024-26726
CVE-2024-26731
CVE-2024-26733
CVE-2024-26734
CVE-2024-26737
CVE-2024-26739
CVE-2024-26740
CVE-2024-26742
CVE-2024-26750
CVE-2024-26756
CVE-2024-26758
CVE-2024-26760
CVE-2024-26761
CVE-2024-26764
CVE-2024-26767
CVE-2024-26769
CVE-2024-26772
CVE-2024-26773
CVE-2024-26774
CVE-2024-26775
CVE-2024-26780
CVE-2024-26783
CVE-2024-26785
CVE-2024-26786
CVE-2024-26791
CVE-2024-26793
CVE-2024-26794
CVE-2024-26802
CVE-2024-26805
CVE-2024-26807
CVE-2024-26813
CVE-2024-26814
CVE-2024-26815
CVE-2024-26816
CVE-2024-26822
CVE-2024-26826
CVE-2024-26832
CVE-2024-26836
CVE-2024-26842
CVE-2024-26844
CVE-2024-26845
CVE-2024-26846
CVE-2024-26853
CVE-2024-26854
CVE-2024-26855
CVE-2024-26856
CVE-2024-26857
CVE-2024-26858
CVE-2024-26860
CVE-2024-26861
CVE-2024-26862
CVE-2024-26863
CVE-2024-26866
CVE-2024-26868
CVE-2024-26870
CVE-2024-26878
CVE-2024-26881
CVE-2024-26882
CVE-2024-26883
CVE-2024-26884
CVE-2024-26885
CVE-2024-26889
CVE-2024-26899
CVE-2024-26900
CVE-2024-26901
CVE-2024-26903
CVE-2024-26906
CVE-2024-26909
CVE-2024-26920
CVE-2024-26921
CVE-2024-26922
CVE-2024-26923
CVE-2024-26925
CVE-2024-26928
CVE-2024-26932
CVE-2024-26933
CVE-2024-26934
CVE-2024-26935
CVE-2024-26937
CVE-2024-26938
CVE-2024-26940
CVE-2024-26943
CVE-2024-26944
CVE-2024-26945
CVE-2024-26946
CVE-2024-26948
CVE-2024-26949
CVE-2024-26950
CVE-2024-26951
CVE-2024-26957
CVE-2024-26958
CVE-2024-26960
CVE-2024-26961
CVE-2024-26962
CVE-2024-26963
CVE-2024-26964
CVE-2024-26972
CVE-2024-26973
CVE-2024-26978
CVE-2024-26981
CVE-2024-26982
CVE-2024-26983
CVE-2024-26984
CVE-2024-26986
CVE-2024-26988
CVE-2024-26989
CVE-2024-26990
CVE-2024-26991
CVE-2024-26992
CVE-2024-26993
CVE-2024-26994
CVE-2024-26995
CVE-2024-26996
CVE-2024-26997
CVE-2024-26999
CVE-2024-27000
CVE-2024-27001
CVE-2024-27002
CVE-2024-27003
CVE-2024-27004
CVE-2024-27008
CVE-2024-27012
CVE-2024-27013
CVE-2024-27014
CVE-2024-27015
CVE-2024-27016
CVE-2024-27019
CVE-2024-27020
CVE-2024-27022
CVE-2024-27025
CVE-2024-27027
CVE-2024-27028
CVE-2024-27030
CVE-2024-27031
CVE-2024-27046
CVE-2024-27056
CVE-2024-27057
CVE-2024-27062
CVE-2024-27064
CVE-2024-27065
CVE-2024-27067
CVE-2024-27080
CVE-2024-27388
CVE-2024-27389
CVE-2024-27393
CVE-2024-27395
CVE-2024-27396
CVE-2024-27399
CVE-2024-27400
CVE-2024-27401
CVE-2024-27402
CVE-2024-27404
CVE-2024-27405
CVE-2024-27408
CVE-2024-27410
CVE-2024-27411
CVE-2024-27412
CVE-2024-27413
CVE-2024-27414
CVE-2024-27416
CVE-2024-27417
CVE-2024-27418
CVE-2024-27419
CVE-2024-27431
CVE-2024-27432
CVE-2024-27434
CVE-2024-27435
CVE-2024-27436
CVE-2024-33619
CVE-2024-34777
CVE-2024-35247
CVE-2024-35784
CVE-2024-35786
CVE-2024-35788
CVE-2024-35789
CVE-2024-35790
CVE-2024-35791
CVE-2024-35794
CVE-2024-35795
CVE-2024-35796
CVE-2024-35799
CVE-2024-35800
CVE-2024-35801
CVE-2024-35803
CVE-2024-35804
CVE-2024-35805
CVE-2024-35806
CVE-2024-35807
CVE-2024-35808
CVE-2024-35809
CVE-2024-35810
CVE-2024-35811
CVE-2024-35812
CVE-2024-35813
CVE-2024-35814
CVE-2024-35815
CVE-2024-35817
CVE-2024-35819
CVE-2024-35821
CVE-2024-35822
CVE-2024-35823
CVE-2024-35824
CVE-2024-35825
CVE-2024-35827
CVE-2024-35828
CVE-2024-35829
CVE-2024-35830
CVE-2024-35831
CVE-2024-35833
CVE-2024-35834
CVE-2024-35835
CVE-2024-35836
CVE-2024-35837
CVE-2024-35838
CVE-2024-35841
CVE-2024-35842
CVE-2024-35843
CVE-2024-35845
CVE-2024-35847
CVE-2024-35848
CVE-2024-35849
CVE-2024-35850
CVE-2024-35851
CVE-2024-35852
CVE-2024-35853
CVE-2024-35854
CVE-2024-35857
CVE-2024-35860
CVE-2024-35861
CVE-2024-35862
CVE-2024-35863
CVE-2024-35864
CVE-2024-35865
CVE-2024-35866
CVE-2024-35867
CVE-2024-35868
CVE-2024-35872
CVE-2024-35875
CVE-2024-35877
CVE-2024-35878
CVE-2024-35879
CVE-2024-35880
CVE-2024-35883
CVE-2024-35884
CVE-2024-35885
CVE-2024-35886
CVE-2024-35887
CVE-2024-35889
CVE-2024-35890
CVE-2024-35891
CVE-2024-35892
CVE-2024-35893
CVE-2024-35895
CVE-2024-35896
CVE-2024-35898
CVE-2024-35899
CVE-2024-35900
CVE-2024-35901
CVE-2024-35903
CVE-2024-35904
CVE-2024-35905
CVE-2024-35907
CVE-2024-35908
CVE-2024-35909
CVE-2024-35911
CVE-2024-35912
CVE-2024-35914
CVE-2024-35915
CVE-2024-35916
CVE-2024-35917
CVE-2024-35921
CVE-2024-35922
CVE-2024-35924
CVE-2024-35925
CVE-2024-35926
CVE-2024-35927
CVE-2024-35928
CVE-2024-35930
CVE-2024-35931
CVE-2024-35932
CVE-2024-35933
CVE-2024-35934
CVE-2024-35935
CVE-2024-35936
CVE-2024-35937
CVE-2024-35938
CVE-2024-35940
CVE-2024-35942
CVE-2024-35943
CVE-2024-35944
CVE-2024-35945
CVE-2024-35946
CVE-2024-35947
CVE-2024-35950
CVE-2024-35951
CVE-2024-35952
CVE-2024-35953
CVE-2024-35954
CVE-2024-35955
CVE-2024-35956
CVE-2024-35957
CVE-2024-35958
CVE-2024-35959
CVE-2024-35960
CVE-2024-35961
CVE-2024-35962
CVE-2024-35963
CVE-2024-35964
CVE-2024-35965
CVE-2024-35966
CVE-2024-35967
CVE-2024-35969
CVE-2024-35970
CVE-2024-35971
CVE-2024-35972
CVE-2024-35973
CVE-2024-35974
CVE-2024-35975
CVE-2024-35976
CVE-2024-35977
CVE-2024-35978
CVE-2024-35979
CVE-2024-35981
CVE-2024-35982
CVE-2024-35984
CVE-2024-35986
CVE-2024-35989
CVE-2024-35990
CVE-2024-35991
CVE-2024-35992
CVE-2024-35995
CVE-2024-35997
CVE-2024-35998
CVE-2024-35999
CVE-2024-36002
CVE-2024-36003
CVE-2024-36004
CVE-2024-36005
CVE-2024-36006
CVE-2024-36007
CVE-2024-36008
CVE-2024-36009
CVE-2024-36010
CVE-2024-36011
CVE-2024-36012
CVE-2024-36013
CVE-2024-36014
CVE-2024-36015
CVE-2024-36016
CVE-2024-36017
CVE-2024-36018
CVE-2024-36019
CVE-2024-36020
CVE-2024-36021
CVE-2024-36024
CVE-2024-36025
CVE-2024-36026
CVE-2024-36029
CVE-2024-36030
CVE-2024-36032
CVE-2024-36281
CVE-2024-36477
CVE-2024-36478
CVE-2024-36479
CVE-2024-36880
CVE-2024-36882
CVE-2024-36885
CVE-2024-36887
CVE-2024-36889
CVE-2024-36890
CVE-2024-36891
CVE-2024-36893
CVE-2024-36894
CVE-2024-36895
CVE-2024-36896
CVE-2024-36897
CVE-2024-36898
CVE-2024-36899
CVE-2024-36900
CVE-2024-36901
CVE-2024-36902
CVE-2024-36903
CVE-2024-36904
CVE-2024-36906
CVE-2024-36909
CVE-2024-36910
CVE-2024-36911
CVE-2024-36912
CVE-2024-36913
CVE-2024-36914
CVE-2024-36915
CVE-2024-36916
CVE-2024-36917
CVE-2024-36918
CVE-2024-36919
CVE-2024-36921
CVE-2024-36922
CVE-2024-36923
CVE-2024-36924
CVE-2024-36926
CVE-2024-36928
CVE-2024-36930
CVE-2024-36931
CVE-2024-36934
CVE-2024-36935
CVE-2024-36936
CVE-2024-36937
CVE-2024-36938
CVE-2024-36940
CVE-2024-36942
CVE-2024-36944
CVE-2024-36945
CVE-2024-36946
CVE-2024-36947
CVE-2024-36949
CVE-2024-36950
CVE-2024-36951
CVE-2024-36952
CVE-2024-36955
CVE-2024-36957
CVE-2024-36959
CVE-2024-36960
CVE-2024-36962
CVE-2024-36964
CVE-2024-36965
CVE-2024-36967
CVE-2024-36969
CVE-2024-36971
CVE-2024-36972
CVE-2024-36973
CVE-2024-36975
CVE-2024-36977
CVE-2024-36978
CVE-2024-37021
CVE-2024-37078
CVE-2024-37353
CVE-2024-37354
CVE-2024-38381
CVE-2024-38384
CVE-2024-38385
CVE-2024-38388
CVE-2024-38390
CVE-2024-38391
CVE-2024-38539
CVE-2024-38540
CVE-2024-38541
CVE-2024-38543
CVE-2024-38544
CVE-2024-38546
CVE-2024-38547
CVE-2024-38548
CVE-2024-38549
CVE-2024-38550
CVE-2024-38551
CVE-2024-38552
CVE-2024-38553
CVE-2024-38554
CVE-2024-38555
CVE-2024-38556
CVE-2024-38557
CVE-2024-38558
CVE-2024-38562
CVE-2024-38564
CVE-2024-38565
CVE-2024-38566
CVE-2024-38567
CVE-2024-38568
CVE-2024-38569
CVE-2024-38570
CVE-2024-38571
CVE-2024-38572
CVE-2024-38573
CVE-2024-38575
CVE-2024-38578
CVE-2024-38579
CVE-2024-38580
CVE-2024-38581
CVE-2024-38582
CVE-2024-38583
CVE-2024-38586
CVE-2024-38587
CVE-2024-38588
CVE-2024-38590
CVE-2024-38591
CVE-2024-38592
CVE-2024-38594
CVE-2024-38595
CVE-2024-38597
CVE-2024-38598
CVE-2024-38599
CVE-2024-38600
CVE-2024-38601
CVE-2024-38602
CVE-2024-38603
CVE-2024-38604
CVE-2024-38605
CVE-2024-38608
CVE-2024-38610
CVE-2024-38611
CVE-2024-38615
CVE-2024-38616
CVE-2024-38617
CVE-2024-38618
CVE-2024-38619
CVE-2024-38621
CVE-2024-38622
CVE-2024-38627
CVE-2024-38628
CVE-2024-38629
CVE-2024-38630
CVE-2024-38633
CVE-2024-38634
CVE-2024-38635
CVE-2024-38636
CVE-2024-38659
CVE-2024-38661
CVE-2024-38663
CVE-2024-38664
CVE-2024-38780
CVE-2024-39276
CVE-2024-39277
CVE-2024-39291
CVE-2024-39296
CVE-2024-39301
CVE-2024-39362
CVE-2024-39371
CVE-2024-39463
CVE-2024-39466
CVE-2024-39468
CVE-2024-39469
CVE-2024-39471
CVE-2024-39472
CVE-2024-39473
CVE-2024-39474
CVE-2024-39475
CVE-2024-39479
CVE-2024-39481
CVE-2024-39482
CVE-2024-39487
CVE-2024-39490
CVE-2024-39494
CVE-2024-39496
CVE-2024-39498
CVE-2024-39502
CVE-2024-39504
CVE-2024-39507
CVE-2024-40901
CVE-2024-40906
CVE-2024-40908
CVE-2024-40919
CVE-2024-40923
CVE-2024-40925
CVE-2024-40928
CVE-2024-40931
CVE-2024-40935
CVE-2024-40937
CVE-2024-40940
CVE-2024-40947
CVE-2024-40948
CVE-2024-40953
CVE-2024-40960
CVE-2024-40961
CVE-2024-40966
CVE-2024-40970
CVE-2024-40972
CVE-2024-40975
CVE-2024-40979
CVE-2024-40998
CVE-2024-40999
CVE-2024-41006
CVE-2024-41011
CVE-2024-41013
CVE-2024-41014
CVE-2024-41017
CVE-2024-41090
CVE-2024-41091
CWE-ID CWE-190
CWE-476
CWE-667
CWE-20
CWE-362
CWE-119
CWE-416
CWE-665
CWE-125
CWE-200
CWE-401
CWE-477
CWE-388
CWE-415
CWE-191
CWE-908
CWE-399
CWE-617
CWE-682
CWE-264
CWE-451
CWE-120
CWE-502
CWE-754
CWE-824
CWE-284
CWE-833
CWE-835
CWE-369
CWE-404
CWE-366
CWE-193
CWE-787
CWE-252
CWE-269
Exploitation vector Network
Public exploit Vulnerability #635 is being exploited in the wild.
Vulnerable software
SUSE Real Time Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150600_10_5-rt
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 783 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU91179

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47432

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the __genradix_iter_peek() function in lib/generic-radix-tree.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU93327

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48772

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lgdt3306a_probe() function in drivers/media/dvb-frontends/lgdt3306a.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU90810

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-0160

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __sock_map_delete() and sock_hash_delete_elem() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU96264

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-38417

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU96262

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2023-47210

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can send specially crafted packets to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Race condition

EUVDB-ID: #VU85024

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-51780

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in the ATM (Asynchronous Transfer Mode) subsystem in Linux kernel. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Buffer overflow

EUVDB-ID: #VU87748

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52435

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the skb_segment() function. A local user can trigger memory corruption and crash the kernel.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) NULL pointer dereference

EUVDB-ID: #VU90657

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52458

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the blkpg_do_ioctl() function in block/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU91244

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52472

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rsa_check_exponent_fips() function in crypto/rsa.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU90234

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52503

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the destroy_session(), amdtee_open_session() and amdtee_close_session() functions in drivers/tee/amdtee/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Improper Initialization

EUVDB-ID: #VU91556

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52616

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the mpi_ec_init() function in lib/mpi/ec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer overflow

EUVDB-ID: #VU93617

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52618

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the rnbd_srv_get_full_path() function in drivers/block/rnbd/rnbd-srv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Buffer overflow

EUVDB-ID: #VU93471

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52622

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the alloc_flex_gd() and ext4_setup_next_flex_gd() functions in fs/ext4/resize.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) NULL pointer dereference

EUVDB-ID: #VU91240

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52631

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fs/ntfs3/ntfs_fs.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Improper locking

EUVDB-ID: #VU92045

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52635

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the devfreq_monitor(), devfreq_monitor_start() and devfreq_monitor_stop() functions in drivers/devfreq/devfreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds read

EUVDB-ID: #VU90331

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52640

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ntfs_list_ea() function in fs/ntfs3/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) NULL pointer dereference

EUVDB-ID: #VU90592

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52641

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ni_find_attr() and run_truncate_around() functions in fs/ntfs3/attrib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Race condition

EUVDB-ID: #VU91477

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52645

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the scpsys_add_subdomain() and scpsys_remove_one_domain() functions in drivers/soc/mediatek/mtk-pm-domains.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Information disclosure

EUVDB-ID: #VU91353

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52652

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the pci_vntb_probe() function in drivers/pci/endpoint/functions/pci-epf-vntb.c, within the EXPORT_SYMBOL() and ntb_register_device() functions in drivers/ntb/core.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Memory leak

EUVDB-ID: #VU90459

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52653

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gss_import_v2_context() function in net/sunrpc/auth_gss/gss_krb5_mech.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use of obsolete function

EUVDB-ID: #VU93856

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52656

CWE-ID: CWE-477 - Use of Obsolete Function

Exploit availability: No

Description

The vulnerability allows a local user to have negative impact on system performance.

The vulnerability exists due to usage of dead code related to SCM_RIGHTS within the io_allocate_scq_urings(), io_ring_ctx_free(), and io_cqring_wait() function in fs/io_uring.c. A local user can influence system performance.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper error handling

EUVDB-ID: #VU92943

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52657

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the si_dpm_enable() and si_dpm_process_interrupt() functions in drivers/gpu/drm/amd/pm/legacy-dpm/si_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Input validation error

EUVDB-ID: #VU93683

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52658

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the esw_inline_mode_to_devlink() and mlx5_devlink_eswitch_mode_set() functions in drivers/net/ethernet/mellanox/mlx5/core/eswitch_offloads.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Input validation error

EUVDB-ID: #VU93682

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52659

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the arch/x86/include/asm/page.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Improper error handling

EUVDB-ID: #VU92057

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52660

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the rkisp1_isp_isr() function in drivers/media/platform/rockchip/rkisp1/rkisp1-isp.c, within the rkisp1_runtime_suspend() and rkisp1_runtime_resume() functions in drivers/media/platform/rockchip/rkisp1/rkisp1-dev.c, within the rkisp1_csi_isr() function in drivers/media/platform/rockchip/rkisp1/rkisp1-csi.c, within the rkisp1_capture_isr() function in drivers/media/platform/rockchip/rkisp1/rkisp1-capture.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper error handling

EUVDB-ID: #VU90948

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52661

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the tegra_dc_rgb_probe() function in drivers/gpu/drm/tegra/rgb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Memory leak

EUVDB-ID: #VU90444

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52662

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vmw_gmrid_man_get_node() function in drivers/gpu/drm/vmwgfx/vmwgfx_gmrid_manager.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Memory leak

EUVDB-ID: #VU89987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52663

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the amd_sof_acp_probe() function in sound/soc/sof/amd/acp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Double free

EUVDB-ID: #VU90893

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52664

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the aq_vec_ring_alloc() function in drivers/net/ethernet/aquantia/atlantic/aq_vec.c, within the aq_get_rxpages(), aq_ring_alloc(), aq_ring_rx_alloc() and aq_ring_hwts_rx_alloc() functions in drivers/net/ethernet/aquantia/atlantic/aq_ring.c, within the aq_ptp_ring_alloc() function in drivers/net/ethernet/aquantia/atlantic/aq_ptp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Double free

EUVDB-ID: #VU90922

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52667

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the fs_any_create_groups() function in drivers/net/ethernet/mellanox/mlx5/core/en/fs_tt_redirect.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Out-of-bounds read

EUVDB-ID: #VU91423

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52669

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ctr_paes_crypt() function in arch/s390/crypto/paes_s390.c, within the ctr_aes_crypt() function in arch/s390/crypto/aes_s390.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Memory leak

EUVDB-ID: #VU89988

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52670

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the virtio_rpmsg_release_device() function in drivers/rpmsg/virtio_rpmsg_bus.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Integer underflow

EUVDB-ID: #VU91668

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52671

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the optc32_disable_crtc() function in drivers/gpu/drm/amd/display/dc/dcn32/dcn32_optc.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Improper locking

EUVDB-ID: #VU92024

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52672

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the pipe_resize_ring() and pipe_set_size() functions in fs/pipe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) NULL pointer dereference

EUVDB-ID: #VU90552

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52673

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the capabilities_show() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Out-of-bounds read

EUVDB-ID: #VU91392

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52674

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the scarlett2_mixer_ctl_put() function in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) NULL pointer dereference

EUVDB-ID: #VU90547

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52675

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the update_events_in_group() function in arch/powerpc/perf/imc-pmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Integer overflow

EUVDB-ID: #VU93061

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52676

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the check_ptr_to_map_access() and check_stack_access_within_bounds() functions in kernel/bpf/verifier.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Improper error handling

EUVDB-ID: #VU93452

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52678

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the kfd_create_indirect_link_prop() and kfd_add_peer_prop() functions in drivers/gpu/drm/amd/amdkfd/kfd_topology.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Double free

EUVDB-ID: #VU90892

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52679

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the of_unittest_parse_phandle_with_args() and of_unittest_parse_phandle_with_args_map() functions in drivers/of/unittest.c, within the of_parse_phandle_with_args_map() function in drivers/of/base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Improper error handling

EUVDB-ID: #VU93618

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52680

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the scarlett2_sync_ctl_get(), scarlett2_master_volume_ctl_get(), scarlett2_volume_ctl_get(), scarlett2_mute_ctl_get(), scarlett2_level_enum_ctl_get(), scarlett2_pad_ctl_get(), scarlett2_air_ctl_get(), scarlett2_phantom_ctl_get(), scarlett2_direct_monitor_ctl_get(), scarlett2_speaker_switch_enum_ctl_get(), scarlett2_talkback_enum_ctl_get(), scarlett2_dim_mute_ctl_get() and scarlett2_mux_src_enum_ctl_get() functions in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Improper locking

EUVDB-ID: #VU93768

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52681

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the efivarfs_init_fs_context() function in fs/efivarfs/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Integer overflow

EUVDB-ID: #VU91424

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52683

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the lpit_update_residency() function in drivers/acpi/acpi_lpit.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Buffer overflow

EUVDB-ID: #VU91437

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52685

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the persistent_ram_init_ecc() function in fs/pstore/ram_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) NULL pointer dereference

EUVDB-ID: #VU90548

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52686

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the opal_event_init() function in arch/powerpc/platforms/powernv/opal-irqchip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Improper error handling

EUVDB-ID: #VU90945

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52687

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the safexcel_send_req() function in drivers/crypto/inside-secure/safexcel_cipher.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Memory leak

EUVDB-ID: #VU89981

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52690

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the scom_debug_init_one() function in arch/powerpc/platforms/powernv/opal-xscom.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Double free

EUVDB-ID: #VU90921

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52691

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the si_dpm_init() function in drivers/gpu/drm/amd/amdgpu/si_dpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Improper error handling

EUVDB-ID: #VU93619

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52692

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the scarlett2_usb_set_config() function in sound/usb/mixer_scarlett_gen2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use of uninitialized resource

EUVDB-ID: #VU91678

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52693

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the acpi_video_dev_register_backlight() function in drivers/acpi/acpi_video.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Resource management error

EUVDB-ID: #VU91606

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52694

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the tpd12s015_probe() function in drivers/gpu/drm/bridge/ti-tpd12s015.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) NULL pointer dereference

EUVDB-ID: #VU90549

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52695

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the create_validate_stream_for_sink() and dm_update_crtc_state() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) NULL pointer dereference

EUVDB-ID: #VU90550

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52696

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the opal_powercap_init() function in arch/powerpc/platforms/powernv/opal-powercap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Input validation error

EUVDB-ID: #VU94127

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52697

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the sof_sdw_rt_sdca_jack_exit() function in sound/soc/intel/boards/sof_sdw_rt_sdca_jack_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Memory leak

EUVDB-ID: #VU89982

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52698

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the netlbl_calipso_ops_register(), netlbl_calipso_add_pass() and netlbl_calipso_genl_init() functions in net/netlabel/netlabel_calipso.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Improper locking

EUVDB-ID: #VU90751

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52699

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the block_end(), get_branch(), get_block() and find_shared() functions in fs/sysv/itree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Memory leak

EUVDB-ID: #VU91621

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52735

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sock_map_unhash(), sock_map_destroy() and sock_map_close() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) NULL pointer dereference

EUVDB-ID: #VU90534

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52749

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the spi_unregister_controller(), __spi_transfer_message_noqueue() and __spi_sync() functions in drivers/spi/spi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Improper error handling

EUVDB-ID: #VU90935

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52750

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the arch/arm64/Kconfig. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Use-after-free

EUVDB-ID: #VU90063

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52751

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the find_or_create_cached_dir(), spin_unlock() and open_cached_dir() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) NULL pointer dereference

EUVDB-ID: #VU91226

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52753

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dc_stream_get_vblank_counter() and dc_stream_get_scanoutpos() functions in drivers/gpu/drm/amd/display/dc/core/dc_stream.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Input validation error

EUVDB-ID: #VU90854

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52754

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the imon_probe() function in drivers/media/rc/imon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Use-after-free

EUVDB-ID: #VU90069

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52757

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the alloc_mid() function in fs/smb/client/transport.c, within the __smb2_handle_cancelled_cmd() function in fs/smb/client/smb2misc.c, within the cifs_compose_mount_options(), __release_mid() and cifs_get_tcon_super() functions in fs/smb/client/cifsproto.h. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Reachable Assertion

EUVDB-ID: #VU90905

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52759

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the qd_check_sync() function in fs/gfs2/quota.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Buffer overflow

EUVDB-ID: #VU93622

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52762

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the virtblk_probe() function in drivers/block/virtio_blk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Resource management error

EUVDB-ID: #VU93590

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52763

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the hci_dat_v1_init(), hci_dat_v1_cleanup() and hci_dat_v1_free_entry() functions in drivers/i3c/master/mipi-i3c-hci/dat_v1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Out-of-bounds read

EUVDB-ID: #VU90278

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52764

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the set_flicker() function in drivers/media/usb/gspca/cpia1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) NULL pointer dereference

EUVDB-ID: #VU90838

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52765

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the DEFINE_MUTEX(), qcom_pmic_get_base_usid(), qcom_pmic_get() and pmic_spmi_probe() functions in drivers/mfd/qcom-spmi-pmic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Out-of-bounds read

EUVDB-ID: #VU91086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52766

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the hci_dma_irq_handler() function in drivers/i3c/master/mipi-i3c-hci/dma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) NULL pointer dereference

EUVDB-ID: #VU93261

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52767

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tls_sw_splice_eof() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Out-of-bounds read

EUVDB-ID: #VU89837

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52768

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary condition within the wilc_wlan_init() function in drivers/net/wireless/microchip/wilc1000/wlan.c. A local user can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Use-after-free

EUVDB-ID: #VU90070

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52769

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ath12k_htt_mlo_offset_event_handler() function in drivers/net/wireless/ath/ath12k/dp_rx.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Use-after-free

EUVDB-ID: #VU90066

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52771

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the grandparent() function in drivers/cxl/core/port.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Use-after-free

EUVDB-ID: #VU90073

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52772

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the unix_stream_recv_urg() function in net/unix/af_unix.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20242973-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) NULL pointer dereference

EUVDB-ID: #VU90418

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52773

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amdgpu_dm_i2c_xfer() function in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP6

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo: before 1-150600.1.5.1

kernel-livepatch-6_4_0-150600_10_5-rt: before 1-150600.1.5.1

kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource: before 1-150600.1.5.1

kernel-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug: before 6.4.0-150600.10.5.1

kernel-source-rt: before 6.4.0-150600.10.5.1

kernel-devel-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-optional: before 6.4.0-150600.10.5.1

kernel-syms-rt: before 6.4.0-150600.10.5.1

kernel-rt-debugsource: before 6.4.0-150600.10.5.1

dlm-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-extra: before 6.4.0-150600.10.5.1

dlm-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-optional-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debuginfo: before 6.4.0-150600.10.5.1

kselftests-kmp-rt: before 6.4.0-150600.10.5.1

ocfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel: before 6.4.0-150600.10.5.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-devel-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt-vdso: before 6.4.0-150600.10.5.1

kernel-rt_debug-vdso: before 6.4.0-150600.10.5.1

kselftests-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-debugsource: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt-debuginfo: before 6.4.0-150600.10.5.1

kernel-rt_debug-devel: before 6.4.0-150600.10.5.1

cluster-md-kmp-rt: before 6.4.0-150600.10.5.1

reiserfs-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt_debug-livepatch-devel: before 6.4.0-150600.10.5.1

kernel-rt-debuginfo: before 6.4.0-150600.10.5.1

gfs2-kmp-rt: before 6.4.0-150600.10.5.1

kernel-rt-extra-debuginfo: before 6.4.0-150600.10.5.1

CPE2.3