SUSE update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)



Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2024-43882
CVE-2024-50115
CVE-2024-53042
CVE-2024-53156
CWE-ID CWE-667
CWE-125
Exploitation vector Local
Public exploit N/A
Vulnerable software
SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

kernel-livepatch-6_4_0-150600_21-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150600_23_17-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150600_21-default
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150600_23_17-default
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP6_Update_0-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP6_Update_3-debugsource
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Improper locking

EUVDB-ID: #VU96295

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43882

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bprm_fill_uid() function in fs/exec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel (Live Patch 3 for SLE 15 SP6) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_21-default-debuginfo: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default-debuginfo: before 14-150600.2.2

kernel-livepatch-6_4_0-150600_21-default: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default: before 14-150600.2.2

kernel-livepatch-SLE15-SP6_Update_0-debugsource: before 16-150600.4.40.2

kernel-livepatch-SLE15-SP6_Update_3-debugsource: before 14-150600.2.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501683-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU99810

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50115

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the nested_svm_get_tdp_pdptr() function in arch/x86/kvm/svm/nested.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel (Live Patch 3 for SLE 15 SP6) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_21-default-debuginfo: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default-debuginfo: before 14-150600.2.2

kernel-livepatch-6_4_0-150600_21-default: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default: before 14-150600.2.2

kernel-livepatch-SLE15-SP6_Update_0-debugsource: before 16-150600.4.40.2

kernel-livepatch-SLE15-SP6_Update_3-debugsource: before 14-150600.2.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501683-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU100718

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53042

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the include/net/ip_tunnels.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel (Live Patch 3 for SLE 15 SP6) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_21-default-debuginfo: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default-debuginfo: before 14-150600.2.2

kernel-livepatch-6_4_0-150600_21-default: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default: before 14-150600.2.2

kernel-livepatch-SLE15-SP6_Update_0-debugsource: before 16-150600.4.40.2

kernel-livepatch-SLE15-SP6_Update_3-debugsource: before 14-150600.2.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501683-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU101911

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53156

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the htc_connect_service() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel (Live Patch 3 for SLE 15 SP6) to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Live Patching: 15-SP6

SUSE Linux Enterprise Real Time 15: SP6

openSUSE Leap: 15.6

SUSE Linux Enterprise Server for SAP Applications 15: SP6

SUSE Linux Enterprise Server 15: SP6

kernel-livepatch-6_4_0-150600_21-default-debuginfo: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default-debuginfo: before 14-150600.2.2

kernel-livepatch-6_4_0-150600_21-default: before 16-150600.4.40.2

kernel-livepatch-6_4_0-150600_23_17-default: before 14-150600.2.2

kernel-livepatch-SLE15-SP6_Update_0-debugsource: before 16-150600.4.40.2

kernel-livepatch-SLE15-SP6_Update_3-debugsource: before 14-150600.2.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501683-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###