SUSE update for the Linux Kernel



Risk Low
Patch available YES
Number of vulnerabilities 71
CVE-ID CVE-2021-22543
CVE-2021-37159
CVE-2021-47634
CVE-2021-47644
CVE-2022-2991
CVE-2022-48636
CVE-2022-48650
CVE-2022-48664
CVE-2022-48953
CVE-2022-48975
CVE-2022-49006
CVE-2022-49076
CVE-2022-49080
CVE-2022-49089
CVE-2022-49124
CVE-2022-49134
CVE-2022-49135
CVE-2022-49151
CVE-2022-49178
CVE-2022-49182
CVE-2022-49201
CVE-2022-49247
CVE-2022-49490
CVE-2022-49626
CVE-2022-49661
CVE-2023-0394
CVE-2023-52572
CVE-2023-52646
CVE-2023-52653
CVE-2023-52853
CVE-2023-52924
CVE-2023-6606
CVE-2024-23307
CVE-2024-26810
CVE-2024-26929
CVE-2024-26930
CVE-2024-26931
CVE-2024-27054
CVE-2024-27388
CVE-2024-27397
CVE-2024-47701
CVE-2024-49867
CVE-2024-49884
CVE-2024-49950
CVE-2024-49963
CVE-2024-49975
CVE-2024-50036
CVE-2024-50067
CVE-2024-50073
CVE-2024-50115
CVE-2024-50251
CVE-2024-50304
CVE-2024-53173
CVE-2024-53217
CVE-2024-53239
CVE-2024-56539
CVE-2024-56548
CVE-2024-56605
CVE-2024-56633
CVE-2024-56647
CVE-2024-56658
CVE-2024-56688
CVE-2024-57896
CVE-2025-21638
CVE-2025-21639
CVE-2025-21640
CVE-2025-21673
CVE-2025-21689
CVE-2025-21690
CVE-2025-21700
CVE-2025-21753
CWE-ID CWE-119
CWE-415
CWE-416
CWE-401
CWE-122
CWE-399
CWE-667
CWE-200
CWE-835
CWE-20
CWE-476
CWE-125
CWE-190
CWE-682
Exploitation vector Local
Public exploit Public exploit code for vulnerability #1 is available.
Public exploit code for vulnerability #51 is available.
Vulnerable software
SUSE Linux Enterprise Server 12 SP5 LTSS Extended
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12 SP5
Operating systems & Components / Operating system

SUSE Linux Enterprise High Availability Extension 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

kernel-default-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-man
Operating systems & Components / Operating system package or component

kernel-macros
Operating systems & Components / Operating system package or component

kernel-devel
Operating systems & Components / Operating system package or component

kernel-source
Operating systems & Components / Operating system package or component

kernel-default-base-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-default
Operating systems & Components / Operating system package or component

gfs2-kmp-default
Operating systems & Components / Operating system package or component

gfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-default
Operating systems & Components / Operating system package or component

ocfs2-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-devel
Operating systems & Components / Operating system package or component

dlm-kmp-default
Operating systems & Components / Operating system package or component

cluster-md-kmp-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-syms
Operating systems & Components / Operating system package or component

kernel-default-base
Operating systems & Components / Operating system package or component

kernel-default-kgraft-devel
Operating systems & Components / Operating system package or component

kernel-default-kgraft
Operating systems & Components / Operating system package or component

kgraft-patch-4_12_14-122_250-default
Operating systems & Components / Operating system package or component

kernel-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default-debugsource
Operating systems & Components / Operating system package or component

kernel-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 71 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU56018

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2021-22543

CWE-ID: CWE-119 - Memory corruption

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Linux kernel when handling VM_IO|VM_PFNMAP vmas in KVM. A local user can  can bypass RO checks and cause the pages to get freed while still accessible by the VMM and guest. As a result, an attacker with the ability to start and control a VM to read/write random pages of memory, can trigger memory corruption and execute arbitrary code with elevated privileges.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Double Free

EUVDB-ID: #VU63575

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-37159

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to hso_free_net_device() function in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state. A local user can trigger double free and use-after-free errors and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU104502

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47634

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vol_attribute_show() function in drivers/mtd/ubi/vmt.c, within the dev_attribute_show(), ubi_attach_mtd_dev() and uif_close() functions in drivers/mtd/ubi/build.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU104405

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47644

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the zoran_queue_init() function in drivers/staging/media/zoran/zoran_driver.c, within the zoran_check_jpg_settings(), zr36057_init(), dma_free_coherent() and zoran_remove() functions in drivers/staging/media/zoran/zoran_card.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Heap-based buffer overflow

EUVDB-ID: #VU67476

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-2991

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the LightNVM subsystem in Linux kernel. A local user can execute arbitrary code on the system with kernel privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Resource management error

EUVDB-ID: #VU92987

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48636

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dasd_alias_remove_device() and dasd_alias_get_start_dev() functions in drivers/s390/block/dasd_alias.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Memory leak

EUVDB-ID: #VU89997

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48650

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __qlt_24xx_handle_abts() function in drivers/scsi/qla2xxx/qla_target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper locking

EUVDB-ID: #VU92031

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48664

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the close_ctree() function in fs/btrfs/disk-io.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Resource management error

EUVDB-ID: #VU99139

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48953

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the cmos_check_acpi_rtc_status(), cmos_pnp_probe(), cmos_of_init() and cmos_platform_probe() functions in drivers/rtc/rtc-cmos.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Information disclosure

EUVDB-ID: #VU99110

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48975

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the gpiochip_setup_dev(), gpiochip_add_data_with_key(), gpiochip_remove_pin_ranges() and ida_free() functions in drivers/gpio/gpiolib.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Infinite loop

EUVDB-ID: #VU99119

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49006

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the probe_remove_event_call() function in kernel/trace/trace_events.c, within the dyn_event_release() and dyn_events_release_all() functions in kernel/trace/trace_dynevent.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU104477

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49076

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfi1_mmu_rb_unregister() function in drivers/infiniband/hw/hfi1/mmu_rb.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU104358

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49080

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the kmem_cache_alloc() function in mm/mempolicy.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Improper locking

EUVDB-ID: #VU104701

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49089

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the spin_lock_irqsave() function in drivers/infiniband/sw/rdmavt/qp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Input validation error

EUVDB-ID: #VU104728

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49124

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the quirk_sandybridge_ifu(), do_machine_check() and __mcheck_cpu_apply_quirks() functions in arch/x86/kernel/cpu/mce/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) NULL pointer dereference

EUVDB-ID: #VU104634

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49134

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlxsw_sp_fdb_notify_mac_process() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_switchdev.c, within the mlxsw_sp1_ptp_got_timestamp() function in drivers/net/ethernet/mellanox/mlxsw/spectrum_ptp.c, within the mlxsw_sp_pude_event_func() function in drivers/net/ethernet/mellanox/mlxsw/spectrum.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Memory leak

EUVDB-ID: #VU104379

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49135

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dp_link_settings_read(), dp_phy_settings_read(), dp_dsc_clock_en_read(), dp_dsc_slice_width_read(), dp_dsc_slice_height_read(), dp_dsc_bits_per_pixel_read(), dp_dsc_pic_width_read(), dp_dsc_pic_height_read(), dp_dsc_chunk_size_read(), dp_dsc_slice_bpg_offset_read() and dcc_en_bits_read() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Improper locking

EUVDB-ID: #VU104708

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49151

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mcba_usb_xmit(), mcba_usb_read_bulk_callback(), mcba_usb_start() and mcba_usb_probe() functions in drivers/net/can/usb/mcba_usb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Memory leak

EUVDB-ID: #VU104386

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49178

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mspro_block_bd_open() and mspro_block_init_disk() functions in drivers/memstick/core/mspro_block.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Use-after-free

EUVDB-ID: #VU104489

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49182

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hclge_add_vport_vlan_table(), hclge_add_vport_all_vlan_table(), hclge_rm_vport_vlan_table(), hclge_rm_vport_all_vlan_table(), hclge_uninit_vport_vlan_table(), hclge_restore_vport_vlan_table() and hclge_uninit_ae_dev() functions in drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) NULL pointer dereference

EUVDB-ID: #VU104644

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49201

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __ibmvnic_open(), ibmvnic_cleanup(), ibmvnic_tx_scrq_clean_buffer(), ibmvnic_xmit() and netif_carrier_off() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Improper locking

EUVDB-ID: #VU104684

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49247

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the stk1160_uninit_isoc(), stk1160_stop_streaming() and stk1160_clear_queue() functions in drivers/media/usb/stk1160/stk1160-v4l.c, within the stk1160_disconnect() function in drivers/media/usb/stk1160/stk1160-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) NULL pointer dereference

EUVDB-ID: #VU104587

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49490

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mdp5_plane_atomic_check_with_state() function in drivers/gpu/drm/msm/disp/mdp5/mdp5_plane.c, within the mdp5_pipe_assign() and mdp5_pipe_release() functions in drivers/gpu/drm/msm/disp/mdp5/mdp5_pipe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU104451

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49626

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the efx_ef10_pci_sriov_disable() function in drivers/net/ethernet/sfc/ef10_sriov.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Memory leak

EUVDB-ID: #VU104329

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49661

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gs_can_open() and gs_can_close() functions in drivers/net/can/usb/gs_usb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) NULL pointer dereference

EUVDB-ID: #VU71352

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-0394

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the rawv6_push_pending_frames() function in net/ipv6/raw.c. A local user can run a specially crafted program on the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Use-after-free

EUVDB-ID: #VU90239

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52572

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the cifs_wake_up_task(), __release_mid(), wait_for_response(), cifs_sync_mid_result(), cifs_compound_callback(), compound_send_recv(), SendReceive() and SendReceiveBlockingLock() functions in fs/smb/client/transport.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) NULL pointer dereference

EUVDB-ID: #VU93858

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52646

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the aio_ring_mremap() function in fs/aio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Memory leak

EUVDB-ID: #VU90459

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52653

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gss_import_v2_context() function in net/sunrpc/auth_gss/gss_krb5_mech.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) NULL pointer dereference

EUVDB-ID: #VU91229

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52853

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cp2112_gpio_irq_startup() and cp2112_probe() functions in drivers/hid/hid-cp2112.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Memory leak

EUVDB-ID: #VU103660

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52924

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_rbtree_walk() function in net/netfilter/nft_set_rbtree.c, within the nft_rhash_walk() function in net/netfilter/nft_set_hash.c, within the nf_tables_dump_setelem() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Out-of-bounds read

EUVDB-ID: #VU85442

Risk: Low

CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-6606

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary condition within the smbCalcSize() function in fs/smb/client/netmisc.c file. A local user can trigger an out-of-bounds read error and gain access to sensitive information or crash the kernel.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Integer overflow

EUVDB-ID: #VU88102

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23307

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow in raid5_cache_count() function. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Improper locking

EUVDB-ID: #VU91318

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26810

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the vfio_send_intx_eventfd(), vfio_pci_intx_mask(), vfio_pci_intx_unmask_handler(), vfio_pci_set_intx_unmask() and vfio_pci_set_intx_mask() functions in drivers/vfio/pci/vfio_pci_intrs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Double free

EUVDB-ID: #VU90894

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26929

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to a double free error within the qla2x00_els_dcmd_sp_free() and qla24xx_els_dcmd_iocb() functions in drivers/scsi/qla2xxx/qla_iocb.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Double free

EUVDB-ID: #VU90895

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26930

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to a double free error within the kfree() function in drivers/scsi/qla2xxx/qla_os.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) NULL pointer dereference

EUVDB-ID: #VU90563

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26931

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qlt_free_session_done() function in drivers/scsi/qla2xxx/qla_target.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Incorrect calculation

EUVDB-ID: #VU93759

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27054

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the dasd_generic_set_online() function in drivers/s390/block/dasd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Memory leak

EUVDB-ID: #VU90449

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27388

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the gssx_dec_option_array() function in net/sunrpc/auth_gss/gss_rpc_xdr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Improper locking

EUVDB-ID: #VU92027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27397

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Use-after-free

EUVDB-ID: #VU98898

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-47701

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_find_inline_entry() function in fs/ext4/inline.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Use-after-free

EUVDB-ID: #VU98885

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49867

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Use-after-free

EUVDB-ID: #VU98867

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49884

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Use-after-free

EUVDB-ID: #VU98876

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49950

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the l2cap_connect_req() function in net/bluetooth/l2cap_core.c, within the hci_remote_features_evt() function in net/bluetooth/hci_event.c, within the hci_acldata_packet() function in net/bluetooth/hci_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Resource management error

EUVDB-ID: #VU99150

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49963

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the bcm2835_mbox_probe() function in drivers/mailbox/bcm2835-mailbox.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory leak

EUVDB-ID: #VU98854

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49975

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __create_xol_area() function in kernel/events/uprobes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Incorrect calculation

EUVDB-ID: #VU99185

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50036

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the dst_destroy() and dst_dev_put() functions in net/core/dst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Use-after-free

EUVDB-ID: #VU99434

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50067

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the uprobe_buffer_init(), prepare_uprobe_buffer() and __uprobe_trace_func() functions in kernel/trace/trace_uprobe.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Use-after-free

EUVDB-ID: #VU99442

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50073

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the gsm_cleanup_mux() function in drivers/tty/n_gsm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Out-of-bounds read

EUVDB-ID: #VU99810

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50115

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the nested_svm_get_tdp_pdptr() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Incorrect calculation

EUVDB-ID: #VU100202

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2024-50251

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the nft_payload_set_eval() function in net/netfilter/nft_payload.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

52) Improper locking

EUVDB-ID: #VU100717

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50304

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ip_tunnel_find() function in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Use-after-free

EUVDB-ID: #VU102058

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53173

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nfs4_open_release() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) NULL pointer dereference

EUVDB-ID: #VU102133

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53217

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the nfsd4_process_cb_update() function in fs/nfsd/nfs4callback.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Use-after-free

EUVDB-ID: #VU102070

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53239

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb6fire_chip_abort(), usb6fire_chip_destroy(), usb6fire_chip_probe() and usb6fire_chip_disconnect() functions in sound/usb/6fire/chip.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Buffer overflow

EUVDB-ID: #VU102236

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56539

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the drivers/net/wireless/marvell/mwifiex/fw.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Use-after-free

EUVDB-ID: #VU102075

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56548

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfsplus_read_wrapper() function in fs/hfsplus/wrapper.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Use-after-free

EUVDB-ID: #VU102020

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56605

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the l2cap_sock_alloc() function in net/bluetooth/l2cap_sock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Use-after-free

EUVDB-ID: #VU102025

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56633

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Input validation error

EUVDB-ID: #VU102186

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56647

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the icmp_route_lookup() function in net/ipv4/icmp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Use-after-free

EUVDB-ID: #VU102033

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56658

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the LLIST_HEAD(), net_free() and cleanup_net() functions in net/core/net_namespace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) NULL pointer dereference

EUVDB-ID: #VU102096

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56688

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xs_sock_reset_state_flags() function in net/sunrpc/xprtsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Use-after-free

EUVDB-ID: #VU102904

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57896

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the close_ctree() function in fs/btrfs/disk-io.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) NULL pointer dereference

EUVDB-ID: #VU103025

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21638

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_alpha_beta() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) NULL pointer dereference

EUVDB-ID: #VU103026

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21639

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() and proc_sctp_do_rto_min() functions in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) NULL pointer dereference

EUVDB-ID: #VU103027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21640

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_hmac_alg() function in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Double free

EUVDB-ID: #VU103515

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21673

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the clean_demultiplex_info() and cifs_put_tcp_session() functions in fs/smb/client/connect.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Out-of-bounds read

EUVDB-ID: #VU103742

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21689

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the qt2_process_read_urb() function in drivers/usb/serial/quatech2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Resource management error

EUVDB-ID: #VU103751

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21690

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dev_warn() and storvsc_on_io_completion() functions in drivers/scsi/storvsc_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Use-after-free

EUVDB-ID: #VU103959

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21700

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Use-after-free

EUVDB-ID: #VU104944

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21753

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fs/btrfs/transaction.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security

SUSE Linux Enterprise Server 12 SP5: LTSS

SUSE Linux Enterprise High Availability Extension 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

SUSE Linux Enterprise Live Patching: 12-SP5

kernel-default-devel-debuginfo: before 4.12.14-122.250.1

kernel-default-man: before 4.12.14-122.250.1

kernel-macros: before 4.12.14-122.250.1

kernel-devel: before 4.12.14-122.250.1

kernel-source: before 4.12.14-122.250.1

kernel-default-base-debuginfo: before 4.12.14-122.250.1

dlm-kmp-default-debuginfo: before 4.12.14-122.250.1

ocfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default: before 4.12.14-122.250.1

gfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

cluster-md-kmp-default: before 4.12.14-122.250.1

ocfs2-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-default-devel: before 4.12.14-122.250.1

dlm-kmp-default: before 4.12.14-122.250.1

cluster-md-kmp-default-debuginfo: before 4.12.14-122.250.1

kernel-syms: before 4.12.14-122.250.1

kernel-default-base: before 4.12.14-122.250.1

kernel-default-kgraft-devel: before 4.12.14-122.250.1

kernel-default-kgraft: before 4.12.14-122.250.1

kgraft-patch-4_12_14-122_250-default: before 1-8.3.1

kernel-default-debuginfo: before 4.12.14-122.250.1

kernel-default-debugsource: before 4.12.14-122.250.1

kernel-default: before 4.12.14-122.250.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20250834-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###