| Risk | Medium |
| Patch available | YES |
| Number of vulnerabilities | 178 |
| CVE-ID | CVE-2022-3564 CVE-2022-3619 CVE-2022-3640 CVE-2022-49762 CVE-2022-49763 CVE-2022-49769 CVE-2022-49770 CVE-2022-49771 CVE-2022-49772 CVE-2022-49773 CVE-2022-49775 CVE-2022-49776 CVE-2022-49777 CVE-2022-49779 CVE-2022-49781 CVE-2022-49783 CVE-2022-49784 CVE-2022-49786 CVE-2022-49787 CVE-2022-49788 CVE-2022-49789 CVE-2022-49790 CVE-2022-49792 CVE-2022-49793 CVE-2022-49794 CVE-2022-49795 CVE-2022-49796 CVE-2022-49797 CVE-2022-49799 CVE-2022-49800 CVE-2022-49801 CVE-2022-49802 CVE-2022-49807 CVE-2022-49809 CVE-2022-49810 CVE-2022-49812 CVE-2022-49813 CVE-2022-49818 CVE-2022-49821 CVE-2022-49822 CVE-2022-49823 CVE-2022-49824 CVE-2022-49825 CVE-2022-49826 CVE-2022-49827 CVE-2022-49830 CVE-2022-49832 CVE-2022-49834 CVE-2022-49835 CVE-2022-49836 CVE-2022-49837 CVE-2022-49839 CVE-2022-49841 CVE-2022-49842 CVE-2022-49845 CVE-2022-49846 CVE-2022-49850 CVE-2022-49853 CVE-2022-49858 CVE-2022-49860 CVE-2022-49861 CVE-2022-49863 CVE-2022-49864 CVE-2022-49865 CVE-2022-49868 CVE-2022-49869 CVE-2022-49870 CVE-2022-49871 CVE-2022-49874 CVE-2022-49879 CVE-2022-49880 CVE-2022-49881 CVE-2022-49885 CVE-2022-49886 CVE-2022-49887 CVE-2022-49888 CVE-2022-49889 CVE-2022-49890 CVE-2022-49891 CVE-2022-49892 CVE-2022-49900 CVE-2022-49901 CVE-2022-49902 CVE-2022-49905 CVE-2022-49906 CVE-2022-49908 CVE-2022-49909 CVE-2022-49910 CVE-2022-49915 CVE-2022-49916 CVE-2022-49917 CVE-2022-49918 CVE-2022-49921 CVE-2022-49922 CVE-2022-49923 CVE-2022-49924 CVE-2022-49925 CVE-2022-49927 CVE-2022-49928 CVE-2022-49929 CVE-2022-49931 CVE-2023-1990 CVE-2023-28866 CVE-2023-53035 CVE-2023-53036 CVE-2023-53038 CVE-2023-53039 CVE-2023-53040 CVE-2023-53041 CVE-2023-53042 CVE-2023-53044 CVE-2023-53045 CVE-2023-53049 CVE-2023-53052 CVE-2023-53054 CVE-2023-53056 CVE-2023-53057 CVE-2023-53058 CVE-2023-53059 CVE-2023-53060 CVE-2023-53062 CVE-2023-53064 CVE-2023-53065 CVE-2023-53066 CVE-2023-53068 CVE-2023-53070 CVE-2023-53071 CVE-2023-53073 CVE-2023-53074 CVE-2023-53075 CVE-2023-53077 CVE-2023-53078 CVE-2023-53079 CVE-2023-53081 CVE-2023-53082 CVE-2023-53084 CVE-2023-53087 CVE-2023-53089 CVE-2023-53090 CVE-2023-53091 CVE-2023-53092 CVE-2023-53093 CVE-2023-53095 CVE-2023-53096 CVE-2023-53098 CVE-2023-53099 CVE-2023-53100 CVE-2023-53101 CVE-2023-53102 CVE-2023-53105 CVE-2023-53106 CVE-2023-53108 CVE-2023-53109 CVE-2023-53111 CVE-2023-53112 CVE-2023-53114 CVE-2023-53116 CVE-2023-53118 CVE-2023-53119 CVE-2023-53123 CVE-2023-53124 CVE-2023-53125 CVE-2023-53128 CVE-2023-53131 CVE-2023-53134 CVE-2023-53137 CVE-2023-53139 CVE-2023-53140 CVE-2023-53142 CVE-2023-53143 CVE-2023-53145 CVE-2024-26804 CVE-2024-53168 CVE-2024-56558 CVE-2025-21999 CVE-2025-22056 CVE-2025-23145 CVE-2025-37789 |
| CWE-ID | CWE-416 CWE-401 CWE-119 CWE-125 CWE-399 CWE-476 CWE-665 CWE-667 CWE-20 CWE-908 CWE-388 CWE-835 CWE-190 CWE-404 CWE-415 CWE-191 CWE-682 |
| Exploitation vector | Local |
| Public exploit | Public exploit code for vulnerability #176 is available. |
| Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system kernel-rt_debug Operating systems & Components / Operating system package or component kernel-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component kernel-syms-rt Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 178 vulnerabilities.
EUVDB-ID: #VU69799
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3564
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the l2cap_reassemble_sdu() function in net/bluetooth/l2cap_core.c. An attacker with physical access to device can trigger a use-after-free error and execute arbitrary code on the system.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69800
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3619
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform a DoS attack.
The vulnerability exists due memory leak within the l2cap_recv_acldata() function in net/bluetooth/l2cap_core.c. An attacker with physical proximity to device can force the system to leak memory and perform denial of service attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70463
Risk: Medium
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-3640
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows an attacker to compromise the affected system.
The vulnerability exists due to a use-after-free error in the 2cap_conn_del() function in net/bluetooth/l2cap_core.c in Linux kernel. An attacker with physical proximity to device can trigger a use-after-free error and execute arbitrary code on the system.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108366
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49762
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ntfs_attr_find() function in fs/ntfs/attrib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108232
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49763
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ntfs_read_inode_mount() function in fs/ntfs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108253
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49769
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the gfs2_check_sb() function in fs/gfs2/ops_fstype.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108233
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49770
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ceph_update_snap_trace() function in fs/ceph/snap.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108342
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49771
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the list_version_get_needed() and list_versions() functions in drivers/md/dm-ioctl.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108384
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49772
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the snd_usbmidi_output_open() function in sound/usb/midi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108369
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49773
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the drivers/gpu/drm/amd/display/dc/dcn314/dcn314_optc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108385
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49775
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the tcp_cdg_init() and tcp_cdg_release() functions in net/ipv4/tcp_cdg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108360
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49776
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the macvlan_common_setup() function in drivers/net/macvlan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108149
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49777
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the i8042_probe() and i8042_remove() functions in drivers/input/serio/i8042.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108220
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49779
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __unregister_kprobe_top() function in kernel/kprobes.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108278
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49781
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the amd_pmu_handle_irq() function in arch/x86/events/amd/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108376
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49783
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the fpu_clone() function in arch/x86/kernel/fpu/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108193
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49784
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the uncore_clean_online() function in arch/x86/events/amd/uncore.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108206
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49786
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the blkcg_css_online() function in block/blk-cgroup.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108205
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49787
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the amd_probe() function in drivers/mmc/host/sdhci-pci-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108204
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49788
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qp_notify_peer_local() and qp_notify_peer() functions in drivers/misc/vmw_vmci/vmci_queue_pair.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108221
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49789
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zfcp_fsf_req_send() function in drivers/s390/scsi/zfcp_fsf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108357
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49790
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the iforce_init_device() function in drivers/input/joystick/iforce/iforce-main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108242
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49792
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sctp_transport_free() function in net/sctp/transport.c, within the sctp_writeable(), sctp_sendmsg_to_asoc(), sctp_sock_rfree() and sctp_wait_for_sndbuf() functions in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108202
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49793
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iio_sysfs_trigger_remove() function in drivers/iio/trigger/iio-trig-sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108201
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49794
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the at91_adc_allocate_trigger() function in drivers/iio/adc/at91_adc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108207
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49795
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rethook_alloc() function in kernel/trace/rethook.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108262
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49796
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the test_gen_kprobe_cmd() and test_gen_kretprobe_cmd() functions in kernel/trace/kprobe_event_gen_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49797
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the trace_event_file_is_valid() and kprobe_event_gen_test_init() functions in kernel/trace/kprobe_event_gen_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108352
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49799
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the register_synth_event() function in kernel/trace/trace_events_synth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108200
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49800
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the test_gen_synth_cmd() and test_empty_synth_event() functions in kernel/trace/synth_event_gen_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108199
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49801
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tracing_release_pipe() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108351
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49802
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the ftrace_add_mod() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108197
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49807
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nvmet_auth_set_key() function in drivers/nvme/target/auth.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108195
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49809
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the x25_lapb_receive_frame() function in net/x25/x25_dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108301
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49810
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the netfs_rreq_unmark_after_write() function in fs/netfs/io.c, within the netfs_rreq_unlock_folios() function in fs/netfs/buffered_read.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108194
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49812
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __br_vlan_set_proto() and ntohs() functions in net/bridge/br_vlan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108192
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49813
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ena_init() function in drivers/net/ethernet/amazon/ena/ena_netdev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108375
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49818
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the mISDN_register_device() function in drivers/isdn/mISDN/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108175
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49821
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mISDN_dsp_element_register() and device_unregister() functions in drivers/isdn/mISDN/dsp_pipeline.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108176
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49822
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cifs_mount() function in fs/cifs/connect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108282
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49823
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_tdev_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108283
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49824
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_tlink_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108284
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49825
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_tport_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108285
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49826
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ata_tport_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108286
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49827
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/gpu/drm/drm_internal.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108180
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49830
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the drm_dev_init() function in drivers/gpu/drm/drm_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108288
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49832
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pinctrl_dt_to_map() function in drivers/pinctrl/devicetree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108223
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49834
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nilfs_remount() function in fs/nilfs2/super.c, within the nilfs_relax_pressure_in_lock(), nilfs_construct_segment(), nilfs_construct_dsync_segment() and nilfs_attach_log_writer() functions in fs/nilfs2/segment.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108181
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49835
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the add_widget_node() function in sound/hda/hdac_sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108171
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49836
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the siox_device_add() function in drivers/siox/siox-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108177
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49837
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __check_func_call() and prepare_func_exit() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108277
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49839
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sas_phy_add() function in drivers/scsi/scsi_transport_sas.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108353
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49841
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108225
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49842
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in sound/soc/soc-core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108392
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49845
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the j1939_send_one() function in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108250
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49846
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the udf_find_entry() function in fs/udf/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108303
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49850
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the kvm_gfn_to_pfn_cache_unmap(), kvm_gfn_to_pfn_cache_init() and kvm_gfn_to_pfn_cache_destroy() functions in virt/kvm/pfncache.c, within the kvm_xen_shared_info_init(), kvm_xen_vcpu_set_attr(), kvm_xen_init_vcpu(), kvm_xen_destroy_vcpu() and kvm_xen_destroy_vm() functions in arch/x86/kvm/xen.c, within the kvm_write_system_time(), kvm_pv_enable_async_pf_int() and kvm_arch_vcpu_create() functions in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108184
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49853
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the drivers/net/macvlan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108148
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49858
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the otx2_tx_napi_handler() and otx2_sq_append_skb() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_txrx.c, within the otx2_sq_init() function in drivers/net/ethernet/marvell/octeontx2/nic/otx2_common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108147
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49860
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the k3_udma_glue_request_tx_chn(), k3_udma_glue_request_rx_chn_priv() and k3_udma_glue_request_remote_rx_chn() functions in drivers/dma/ti/k3-udma-glue.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108146
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49861
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mv_xor_v2_remove() function in drivers/dma/mv_xor_v2.c. A local user can perform a denial of service attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108274
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49863
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the can_rx_register() function in net/can/af_can.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108273
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49864
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mutex_unlock() function in drivers/gpu/drm/amd/amdkfd/kfd_migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108338
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49865
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ip6addrlbl_putmsg() function in net/ipv6/addrlabel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108387
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49868
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mt7621_pcie_phy_of_xlate() function in drivers/phy/ralink/phy-mt7621-pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108272
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49869
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the bnxt_set_coalesce() function in drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108251
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49870
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the include/uapi/linux/capability.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108143
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49871
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the local_bh_disable() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108131
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49874
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mousevsc_probe() function in drivers/hid/hid-hyperv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108331
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49879
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the make_indexed_dir() function in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108349
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49880
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the ext4_ext_migrate() function in fs/ext4/migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108138
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49881
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the regdb_fw_cb() and query_regdb_file() functions in net/wireless/reg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108341
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49885
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the ghes_unmap() function in drivers/acpi/apei/ghes.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108364
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49886
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the VE_GET_PORT_NUM() and tdx_parse_tdinfo() functions in arch/x86/coco/tdx/tdx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108137
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49887
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vdec_probe() function in drivers/staging/media/meson/vdec/vdec.c. A local user can perform a denial of service attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108332
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49888
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the cortex_a76_erratum_1463225_svc_handler() function in arch/arm64/kernel/entry-common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49889
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ring_buffer_wake_waiters() function in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108136
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49890
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cap_inode_getsecurity() function in security/commoncap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108135
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49891
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the test_gen_kprobe_cmd() and test_gen_kretprobe_cmd() functions in kernel/trace/kprobe_event_gen_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108227
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49892
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ftrace_shutdown() function in kernel/trace/ftrace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49900
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the piix4_probe() function in drivers/i2c/busses/i2c-piix4.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108150
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49901
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the blk_mq_init_allocated_queue() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108151
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49902
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bdi_unregister() function in block/genhd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108152
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49905
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smc_init() and smc_pnet_exit() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108153
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49906
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __ibmvnic_reset() function in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108154
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49908
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the l2cap_recv_acldata() function in net/bluetooth/l2cap_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108229
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49909
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_data_channel() function in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108230
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49910
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the l2cap_rx_state_recv(), l2cap_rx() and l2cap_stream_rx() functions in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108158
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49915
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mISDN_register_device() function in drivers/isdn/mISDN/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108339
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49916
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the rose_transmit_clear_request() function in net/rose/rose_link.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108370
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49917
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ip_vs_app_net_init() function in net/netfilter/ipvs/ip_vs_app.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108309
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49918
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ip_vs_conn_net_init() function in net/netfilter/ipvs/ip_vs_conn.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108219
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49921
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the red_enqueue() function in net/sched/sch_red.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108159
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49922
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nfcmrvl_i2c_nci_send() function in drivers/nfc/nfcmrvl/i2c.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108160
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49923
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nxp_nci_send() function in drivers/nfc/nxp-nci/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108161
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49924
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fdp_nci_close() function in drivers/nfc/fdp/fdp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108311
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49925
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nldev_init() function in drivers/infiniband/core/nldev.c, within the ib_core_init() function in drivers/infiniband/core/device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49927
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nfs40_init_client() function in fs/nfs/nfs4client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108265
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49928
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rpc_sysfs_client_setup(), rpc_sysfs_xprt_switch_setup() and rpc_sysfs_xprt_setup() functions in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108187
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49929
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the read_reply() function in drivers/infiniband/sw/rxe/rxe_resp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108263
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49931
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sc_disable() function in drivers/infiniband/hw/hfi1/pio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-1990
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the ndlc_remove() function in drivers/nfc/st-nci/ndlc.c. A local user can trigger a use-after-free error and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75455
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-28866
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in net/bluetooth/hci_sync.c in Linux kernel. An attacker with physical proximity to device can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108413
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53035
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nilfs_ioctl_wrap_copy() function in fs/nilfs2/ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108509
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53036
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to failure to properly release resources within the amdgpu_bo_release_notify() function in drivers/gpu/drm/amd/amdgpu/amdgpu_object.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108466
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53038
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lpfc_read_object() function in drivers/scsi/lpfc/lpfc_sli.c, within the lpfc_sli4_cgn_params_read() function in drivers/scsi/lpfc/lpfc_init.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108487
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53039
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the void recv_ipc() and ish_dev_init() functions in drivers/hid/intel-ish-hid/ipc/ipc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108491
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53040
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ca8210_skb_tx() function in drivers/net/ieee802154/ca8210.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108469
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53041
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108490
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53042
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the dcn30_prepare_bandwidth() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_hwseq.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108465
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53044
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the alloc_dev() function in drivers/md/dm.c, within the dm_stat_in_flight() and dm_stats_init() functions in drivers/md/dm-stats.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108470
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53045
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the g_audio_cleanup() function in drivers/usb/gadget/function/u_audio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108464
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53049
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ucsi_init() function in drivers/usb/typec/ucsi/ucsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108472
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53052
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the tconInfoAlloc() and tconInfoFree() functions in fs/cifs/misc.c, within the DECLARE_RWSEM(), dfs_cache_destroy(), dfs_cache_add_refsrv_session() and dfs_cache_remount_fs() functions in fs/cifs/dfs_cache.c, within the get_session(), get_dfs_conn(), __dfs_mount_share() and dfs_mount_share() functions in fs/cifs/dfs.c, within the cifs_mount() and cifs_umount() functions in fs/cifs/connect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108415
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53054
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dwc2_get_dr_mode(), __dwc2_lowlevel_hw_enable() and __dwc2_lowlevel_hw_disable() functions in drivers/usb/dwc2/platform.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108462
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53056
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla2x00_get_sp_from_handle() and qla25xx_process_bidir_status_iocb() functions in drivers/scsi/qla2xxx/qla_isr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108439
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53057
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the void recv_ipc() and ish_dev_init() functions in drivers/hid/intel-ish-hid/ipc/ipc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108488
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53058
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the mlx5_esw_acl_ingress_vport_bond_update() function in drivers/net/ethernet/mellanox/mlx5/core/esw/acl/ingress_ofld.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108416
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53059
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cros_ec_chardev_ioctl_xcmd() function in drivers/platform/chrome/cros_ec_chardev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53060
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the igb_remove() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108418
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53062
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smsc95xx_rx_fixup() function in drivers/net/usb/smsc95xx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108504
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53064
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iavf_remove() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108440
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53065
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the perf_event_bpf_output() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108461
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53066
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qed_iov_configure_min_tx_rate() and qed_iov_handle_trust_change() functions in drivers/net/ethernet/qlogic/qed/qed_sriov.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108419
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53068
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the lan78xx_rx() function in drivers/net/usb/lan78xx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108475
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53070
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the topology_get_acpi_cpu_tag() function in drivers/acpi/pptt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108460
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53071
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mt76_register_phy(), mt76_unregister_phy(), mt76_register_device() and mt76_unregister_device() functions in drivers/net/wireless/mediatek/mt76/mac80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108489
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53073
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the amd_pmu_v2_handle_irq() function in arch/x86/events/amd/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108476
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53074
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the psp_hdcp_initialize(), psp_dtm_initialize() and psp_rap_initialize() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108435
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53075
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lookup_rec() function in kernel/trace/ftrace.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108441
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53077
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the CalculateVMAndRowBytes() function in drivers/gpu/drm/amd/display/dc/dml/dcn30/display_mode_vba_30.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108421
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53078
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alua_activate() function in drivers/scsi/device_handler/scsi_dh_alua.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108459
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53079
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the esw_disable_vport() function in drivers/net/ethernet/mellanox/mlx5/core/eswitch.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108496
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53081
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ocfs2_write_end_nolock() function in fs/ocfs2/aops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108434
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53082
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vp_vdpa_remove() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108424
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53084
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108498
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53087
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the replace_barrier() and i915_active_add_request() functions in drivers/gpu/drm/i915/i915_active.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108493
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53089
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the ext4_xattr_inode_iget() function in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108431
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53090
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the alloc_event_waiters() function in drivers/gpu/drm/amd/amdkfd/kfd_events.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108458
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53091
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ext4_load_journal() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108423
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53092
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the exynos_generic_icc_probe() function in drivers/interconnect/samsung/exynos.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108495
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53093
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __create_val_field() function in kernel/trace/trace_events_hist.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108456
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53095
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ttm_device_swapout() function in drivers/gpu/drm/ttm/ttm_device.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53096
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the icc_node_destroy() function in drivers/interconnect/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108455
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53098
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gpio_ir_recv_probe() and MODULE_DEVICE_TABLE() functions in drivers/media/rc/gpio-ir-recv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108430
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53099
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the do_feature_check_call() function in drivers/firmware/xilinx/zynqmp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108505
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53100
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108506
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53101
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the swap_inode_boot_loader() function in fs/ext4/ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108454
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53102
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ice_qp_dis() function in drivers/net/ethernet/intel/ice/ice_xsk.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108453
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53105
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5e_tc_esw_cleanup() function in drivers/net/ethernet/mellanox/mlx5/core/en_tc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108429
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53106
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL() function in drivers/nfc/st-nci/ndlc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108479
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53108
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the net/iucv/iucv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108480
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53109
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the LL_RESERVED_SPACE() function in net/ipv6/ip6_tunnel.c, within the ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108428
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53111
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the loop_queue_rq() function in drivers/block/loop.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108442
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53112
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drivers/gpu/drm/i915/gt/intel_sseu.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108451
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53114
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the i40e_init_recovery_mode() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108427
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53116
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __nvmet_req_complete() function in drivers/nvme/target/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108507
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53118
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108450
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53119
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the pn533_usb_send_frame() function in drivers/nfc/pn533/usb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108426
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53123
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pci_bus_resource_n() function in drivers/pci/bus.c, within the zpci_bus_prepare_device() function in arch/s390/pci/pci_bus.c, within the __alloc_res() and zpci_setup_bus_resources() functions in arch/s390/pci/pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108448
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53124
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mpt3sas_transport_port_add() function in drivers/scsi/mpt3sas/mpt3sas_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108411
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53125
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smsc75xx_rx_fixup() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108408
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53128
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mpi3mr_free_mem() function in drivers/scsi/mpi3mr/mpi3mr_fw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108406
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53131
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the svc_start_kthreads() and svc_stop_kthreads() functions in net/sunrpc/svc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108501
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53134
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bnxt_alloc_ring(), bnxt_free_tpa_info() and bnxt_alloc_tpa_info() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108483
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53137
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_rename() and ext4_journal_stop() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108445
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53139
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the fdp_nci_i2c_read_device_properties() and dev_dbg() functions in drivers/nfc/fdp/i2c.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108403
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53140
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the scsi_remove_host() and scsi_host_dev_release() functions in drivers/scsi/hosts.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108492
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53142
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ice_get_module_eeprom() function in drivers/net/ethernet/intel/ice/ice_ethtool.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108486
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53143
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ext4_getfsmap_datadev() function in fs/ext4/fsmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109252
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53145
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btsdio_remove() function in drivers/bluetooth/btsdio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90212
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26804
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tnl_update_pmtu(), ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102061
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53168
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the xs_create_sock() function in net/sunrpc/xprtsock.c, within the svc_create_socket() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102042
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56558
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the e_show() function in fs/nfsd/export.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106955
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21999
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the proc_get_inode() function in fs/proc/inode.c, within the proc_create_reg(), proc_create_seq_private() and proc_create_single_data() functions in fs/proc/generic.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107782
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2025-22056
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nft_tunnel_obj_geneve_init() and nft_tunnel_opts_dump() functions in net/netfilter/nft_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU108299
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23145
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108394
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37789
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the validate_set() function in net/openvswitch/flow_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.97.1
kernel-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-devel: before 5.14.21-150500.13.97.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt: before 5.14.21-150500.13.97.1
kernel-syms-rt: before 5.14.21-150500.13.97.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-devel: before 5.14.21-150500.13.97.1
dlm-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-debugsource: before 5.14.21-150500.13.97.1
kernel-rt-extra: before 5.14.21-150500.13.97.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1
reiserfs-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1
ocfs2-kmp-rt: before 5.14.21-150500.13.97.1
gfs2-kmp-rt: before 5.14.21-150500.13.97.1
cluster-md-kmp-rt: before 5.14.21-150500.13.97.1
kernel-rt-debuginfo: before 5.14.21-150500.13.97.1
kernel-rt-vdso: before 5.14.21-150500.13.97.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1
kernel-rt-optional: before 5.14.21-150500.13.97.1
kernel-devel-rt: before 5.14.21-150500.13.97.1
kernel-source-rt: before 5.14.21-150500.13.97.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.