Risk | Low |
Patch available | YES |
Number of vulnerabilities | 71 |
CVE-ID | CVE-2021-22543 CVE-2021-37159 CVE-2021-47634 CVE-2021-47644 CVE-2022-2991 CVE-2022-48636 CVE-2022-48650 CVE-2022-48664 CVE-2022-48953 CVE-2022-48975 CVE-2022-49006 CVE-2022-49076 CVE-2022-49080 CVE-2022-49089 CVE-2022-49124 CVE-2022-49134 CVE-2022-49135 CVE-2022-49151 CVE-2022-49178 CVE-2022-49182 CVE-2022-49201 CVE-2022-49247 CVE-2022-49490 CVE-2022-49626 CVE-2022-49661 CVE-2023-0394 CVE-2023-52572 CVE-2023-52646 CVE-2023-52653 CVE-2023-52853 CVE-2023-52924 CVE-2023-6606 CVE-2024-23307 CVE-2024-26810 CVE-2024-26929 CVE-2024-26930 CVE-2024-26931 CVE-2024-27054 CVE-2024-27388 CVE-2024-27397 CVE-2024-47701 CVE-2024-49867 CVE-2024-49884 CVE-2024-49950 CVE-2024-49963 CVE-2024-49975 CVE-2024-50036 CVE-2024-50067 CVE-2024-50073 CVE-2024-50115 CVE-2024-50251 CVE-2024-50304 CVE-2024-53173 CVE-2024-53217 CVE-2024-53239 CVE-2024-56539 CVE-2024-56548 CVE-2024-56605 CVE-2024-56633 CVE-2024-56647 CVE-2024-56658 CVE-2024-56688 CVE-2024-57896 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21673 CVE-2025-21689 CVE-2025-21690 CVE-2025-21700 CVE-2025-21753 |
CWE-ID | CWE-119 CWE-415 CWE-416 CWE-401 CWE-122 CWE-399 CWE-667 CWE-200 CWE-835 CWE-20 CWE-476 CWE-125 CWE-190 CWE-682 |
Exploitation vector | Local |
Public exploit |
Public exploit code for vulnerability #1 is available. Public exploit code for vulnerability #51 is available. |
Vulnerable software |
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise High Availability Extension 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component kernel-default-man Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-default-base-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component kernel-default-kgraft-devel Operating systems & Components / Operating system package or component kernel-default-kgraft Operating systems & Components / Operating system package or component kgraft-patch-4_12_14-122_250-default Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 71 vulnerabilities.
EUVDB-ID: #VU56018
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2021-22543
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in Linux kernel when handling VM_IO|VM_PFNMAP vmas in KVM. A local user can can bypass RO checks and cause the pages to get freed while still accessible by the VMM and guest. As a result, an attacker with the ability to start and control a VM to read/write random pages of memory, can trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU63575
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-37159
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to hso_free_net_device() function in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state. A local user can trigger double free and use-after-free errors and execute arbitrary code with elevated privileges.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104502
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47634
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vol_attribute_show() function in drivers/mtd/ubi/vmt.c, within the dev_attribute_show(), ubi_attach_mtd_dev() and uif_close() functions in drivers/mtd/ubi/build.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104405
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47644
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the zoran_queue_init() function in drivers/staging/media/zoran/zoran_driver.c, within the zoran_check_jpg_settings(), zr36057_init(), dma_free_coherent() and zoran_remove() functions in drivers/staging/media/zoran/zoran_card.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67476
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2991
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the LightNVM subsystem in Linux kernel. A local user can execute arbitrary code on the system with kernel privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92987
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48636
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dasd_alias_remove_device() and dasd_alias_get_start_dev() functions in drivers/s390/block/dasd_alias.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89997
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48650
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __qlt_24xx_handle_abts() function in drivers/scsi/qla2xxx/qla_target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92031
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48664
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the close_ctree() function in fs/btrfs/disk-io.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99139
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48953
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the cmos_check_acpi_rtc_status(), cmos_pnp_probe(), cmos_of_init() and cmos_platform_probe() functions in drivers/rtc/rtc-cmos.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99110
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48975
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the gpiochip_setup_dev(), gpiochip_add_data_with_key(), gpiochip_remove_pin_ranges() and ida_free() functions in drivers/gpio/gpiolib.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99119
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49006
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the probe_remove_event_call() function in kernel/trace/trace_events.c, within the dyn_event_release() and dyn_events_release_all() functions in kernel/trace/trace_dynevent.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104477
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49076
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfi1_mmu_rb_unregister() function in drivers/infiniband/hw/hfi1/mmu_rb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104358
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49080
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the kmem_cache_alloc() function in mm/mempolicy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104701
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49089
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the spin_lock_irqsave() function in drivers/infiniband/sw/rdmavt/qp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104728
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49124
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the quirk_sandybridge_ifu(), do_machine_check() and __mcheck_cpu_apply_quirks() functions in arch/x86/kernel/cpu/mce/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104634
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49134
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlxsw_sp_fdb_notify_mac_process() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_switchdev.c, within the mlxsw_sp1_ptp_got_timestamp() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_ptp.c, within the mlxsw_sp_pude_event_func() function in drivers/net/ethernet/mellanox/mlxsw/spectrum.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104379
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49135
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dp_link_settings_read(), dp_phy_settings_read(), dp_dsc_clock_en_read(), dp_dsc_slice_width_read(), dp_dsc_slice_height_read(), dp_dsc_bits_per_pixel_read(), dp_dsc_pic_width_read(), dp_dsc_pic_height_read(), dp_dsc_chunk_size_read(), dp_dsc_slice_bpg_offset_read() and dcc_en_bits_read() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104708
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49151
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mcba_usb_xmit(), mcba_usb_read_bulk_callback(), mcba_usb_start() and mcba_usb_probe() functions in drivers/net/can/usb/mcba_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104386
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49178
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mspro_block_bd_open() and mspro_block_init_disk() functions in drivers/memstick/core/mspro_block.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104489
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49182
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hclge_add_vport_vlan_table(), hclge_add_vport_all_vlan_table(), hclge_rm_vport_vlan_table(), hclge_rm_vport_all_vlan_table(), hclge_uninit_vport_vlan_table(), hclge_restore_vport_vlan_table() and hclge_uninit_ae_dev() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104644
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49201
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __ibmvnic_open(), ibmvnic_cleanup(), ibmvnic_tx_scrq_clean_buffer(), ibmvnic_xmit() and netif_carrier_off() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104684
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49247
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the stk1160_uninit_isoc(), stk1160_stop_streaming() and stk1160_clear_queue() functions in drivers/media/usb/stk1160/stk1160-v4l.c, within the stk1160_disconnect() function in drivers/media/usb/stk1160/stk1160-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104587
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49490
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mdp5_plane_atomic_check_with_state() function in drivers/gpu/drm/msm/disp/mdp5/mdp5_plane.c, within the mdp5_pipe_assign() and mdp5_pipe_release() functions in drivers/gpu/drm/msm/disp/mdp5/mdp5_pipe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104451
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49626
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the efx_ef10_pci_sriov_disable() function in drivers/net/ethernet/sfc/ef10_sriov.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104329
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49661
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gs_can_open() and gs_can_close() functions in drivers/net/can/usb/gs_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71352
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-0394
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the rawv6_push_pending_frames() function in net/ipv6/raw.c. A local user can run a specially crafted program on the system and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90239
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52572
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the cifs_wake_up_task(), __release_mid(), wait_for_response(), cifs_sync_mid_result(), cifs_compound_callback(), compound_send_recv(), SendReceive() and SendReceiveBlockingLock() functions in fs/smb/client/transport.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93858
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52646
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the aio_ring_mremap() function in fs/aio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90459
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52653
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gss_import_v2_context() function in net/sunrpc/auth_gss/gss_krb5_mech.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91229
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52853
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cp2112_gpio_irq_startup() and cp2112_probe() functions in drivers/hid/hid-cp2112.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103660
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52924
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_rbtree_walk() function in net/netfilter/nft_set_rbtree.c, within the nft_rhash_walk() function in net/netfilter/nft_set_hash.c, within the nf_tables_dump_setelem() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU85442
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-6606
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a boundary condition within the smbCalcSize() function in fs/smb/client/netmisc.c file. A local user can trigger an out-of-bounds read error and gain access to sensitive information or crash the kernel.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88102
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-23307
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow in raid5_cache_count() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91318
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26810
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_pci_intx_mask(), vfio_pci_intx_unmask_handler(), vfio_pci_set_intx_unmask() and vfio_pci_set_intx_mask() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90894
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26929
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to a double free error within the qla2x00_els_dcmd_sp_free() and qla24xx_els_dcmd_iocb() functions in drivers/scsi/qla2xxx/qla_iocb.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90895
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26930
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to a double free error within the kfree() function in drivers/scsi/qla2xxx/qla_os.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90563
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26931
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qlt_free_session_done() function in drivers/scsi/qla2xxx/qla_target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93759
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27054
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the dasd_generic_set_online() function in drivers/s390/block/dasd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90449
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27388
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the gssx_dec_option_array() function in net/sunrpc/auth_gss/gss_rpc_xdr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27397
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98898
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-47701
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_find_inline_entry() function in fs/ext4/inline.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98885
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49867
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98867
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49884
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98876
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49950
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_connect_req() function in net/bluetooth/l2cap_core.c, within the hci_remote_features_evt() function in net/bluetooth/hci_event.c, within the hci_acldata_packet() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49963
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98854
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-49975
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __create_xol_area() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99185
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50036
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the dst_destroy() and dst_dev_put() functions in net/core/dst.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99434
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50067
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the uprobe_buffer_init(), prepare_uprobe_buffer() and __uprobe_trace_func() functions in kernel/trace/trace_uprobe.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99442
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50073
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the gsm_cleanup_mux() function in drivers/tty/n_gsm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99810
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50115
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the nested_svm_get_tdp_pdptr() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100202
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2024-50251
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the nft_payload_set_eval() function in net/netfilter/nft_payload.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU100717
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50304
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip_tunnel_find() function in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102058
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53173
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53217
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the nfsd4_process_cb_update() function in fs/nfsd/nfs4callback.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102070
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53239
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102236
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56539
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102075
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56548
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfsplus_read_wrapper() function in fs/hfsplus/wrapper.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102020
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56605
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102025
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56633
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102186
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56647
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the icmp_route_lookup() function in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102033
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56658
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the LLIST_HEAD(), net_free() and cleanup_net() functions in net/core/net_namespace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102096
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56688
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102904
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57896
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103025
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21638
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_alpha_beta() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103026
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21639
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() and proc_sctp_do_rto_min() functions in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21640
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103515
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21673
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the clean_demultiplex_info() and cifs_put_tcp_session() functions in fs/smb/client/connect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103742
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21689
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qt2_process_read_urb() function in drivers/usb/serial/quatech2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103751
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21690
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dev_warn() and storvsc_on_io_completion() functions in drivers/scsi/storvsc_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103959
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21700
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104944
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21753
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/btrfs/transaction.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise High Availability Extension 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-devel-debuginfo: before 4.12.14-122.250.1
kernel-default-man: before 4.12.14-122.250.1
kernel-macros: before 4.12.14-122.250.1
kernel-devel: before 4.12.14-122.250.1
kernel-source: before 4.12.14-122.250.1
kernel-default-base-debuginfo: before 4.12.14-122.250.1
dlm-kmp-default-debuginfo: before 4.12.14-122.250.1
ocfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default: before 4.12.14-122.250.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
cluster-md-kmp-default: before 4.12.14-122.250.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-default-devel: before 4.12.14-122.250.1
dlm-kmp-default: before 4.12.14-122.250.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1
kernel-syms: before 4.12.14-122.250.1
kernel-default-base: before 4.12.14-122.250.1
kernel-default-kgraft-devel: before 4.12.14-122.250.1
kernel-default-kgraft: before 4.12.14-122.250.1
kgraft-patch-4_12_14-122_250-default: before 1-8.3.1
kernel-default-debuginfo: before 4.12.14-122.250.1
kernel-default-debugsource: before 4.12.14-122.250.1
kernel-default: before 4.12.14-122.250.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.