SUSE update for the Linux Kernel



Risk Medium
Patch available YES
Number of vulnerabilities 178
CVE-ID CVE-2022-3564
CVE-2022-3619
CVE-2022-3640
CVE-2022-49762
CVE-2022-49763
CVE-2022-49769
CVE-2022-49770
CVE-2022-49771
CVE-2022-49772
CVE-2022-49773
CVE-2022-49775
CVE-2022-49776
CVE-2022-49777
CVE-2022-49779
CVE-2022-49781
CVE-2022-49783
CVE-2022-49784
CVE-2022-49786
CVE-2022-49787
CVE-2022-49788
CVE-2022-49789
CVE-2022-49790
CVE-2022-49792
CVE-2022-49793
CVE-2022-49794
CVE-2022-49795
CVE-2022-49796
CVE-2022-49797
CVE-2022-49799
CVE-2022-49800
CVE-2022-49801
CVE-2022-49802
CVE-2022-49807
CVE-2022-49809
CVE-2022-49810
CVE-2022-49812
CVE-2022-49813
CVE-2022-49818
CVE-2022-49821
CVE-2022-49822
CVE-2022-49823
CVE-2022-49824
CVE-2022-49825
CVE-2022-49826
CVE-2022-49827
CVE-2022-49830
CVE-2022-49832
CVE-2022-49834
CVE-2022-49835
CVE-2022-49836
CVE-2022-49837
CVE-2022-49839
CVE-2022-49841
CVE-2022-49842
CVE-2022-49845
CVE-2022-49846
CVE-2022-49850
CVE-2022-49853
CVE-2022-49858
CVE-2022-49860
CVE-2022-49861
CVE-2022-49863
CVE-2022-49864
CVE-2022-49865
CVE-2022-49868
CVE-2022-49869
CVE-2022-49870
CVE-2022-49871
CVE-2022-49874
CVE-2022-49879
CVE-2022-49880
CVE-2022-49881
CVE-2022-49885
CVE-2022-49886
CVE-2022-49887
CVE-2022-49888
CVE-2022-49889
CVE-2022-49890
CVE-2022-49891
CVE-2022-49892
CVE-2022-49900
CVE-2022-49901
CVE-2022-49902
CVE-2022-49905
CVE-2022-49906
CVE-2022-49908
CVE-2022-49909
CVE-2022-49910
CVE-2022-49915
CVE-2022-49916
CVE-2022-49917
CVE-2022-49918
CVE-2022-49921
CVE-2022-49922
CVE-2022-49923
CVE-2022-49924
CVE-2022-49925
CVE-2022-49927
CVE-2022-49928
CVE-2022-49929
CVE-2022-49931
CVE-2023-1990
CVE-2023-28866
CVE-2023-53035
CVE-2023-53036
CVE-2023-53038
CVE-2023-53039
CVE-2023-53040
CVE-2023-53041
CVE-2023-53042
CVE-2023-53044
CVE-2023-53045
CVE-2023-53049
CVE-2023-53052
CVE-2023-53054
CVE-2023-53056
CVE-2023-53057
CVE-2023-53058
CVE-2023-53059
CVE-2023-53060
CVE-2023-53062
CVE-2023-53064
CVE-2023-53065
CVE-2023-53066
CVE-2023-53068
CVE-2023-53070
CVE-2023-53071
CVE-2023-53073
CVE-2023-53074
CVE-2023-53075
CVE-2023-53077
CVE-2023-53078
CVE-2023-53079
CVE-2023-53081
CVE-2023-53082
CVE-2023-53084
CVE-2023-53087
CVE-2023-53089
CVE-2023-53090
CVE-2023-53091
CVE-2023-53092
CVE-2023-53093
CVE-2023-53095
CVE-2023-53096
CVE-2023-53098
CVE-2023-53099
CVE-2023-53100
CVE-2023-53101
CVE-2023-53102
CVE-2023-53105
CVE-2023-53106
CVE-2023-53108
CVE-2023-53109
CVE-2023-53111
CVE-2023-53112
CVE-2023-53114
CVE-2023-53116
CVE-2023-53118
CVE-2023-53119
CVE-2023-53123
CVE-2023-53124
CVE-2023-53125
CVE-2023-53128
CVE-2023-53131
CVE-2023-53134
CVE-2023-53137
CVE-2023-53139
CVE-2023-53140
CVE-2023-53142
CVE-2023-53143
CVE-2023-53145
CVE-2024-26804
CVE-2024-53168
CVE-2024-56558
CVE-2025-21999
CVE-2025-22056
CVE-2025-23145
CVE-2025-37789
CWE-ID CWE-416
CWE-401
CWE-119
CWE-125
CWE-399
CWE-476
CWE-665
CWE-667
CWE-20
CWE-908
CWE-388
CWE-835
CWE-190
CWE-404
CWE-415
CWE-191
CWE-682
Exploitation vector Local
Public exploit Public exploit code for vulnerability #176 is available.
Vulnerable software
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 178 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU69799

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-3564

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows an attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the l2cap_reassemble_sdu() function in net/bluetooth/l2cap_core.c. An attacker with physical access to device can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU69800

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-3619

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows an attacker to perform a DoS attack.

The vulnerability exists due memory leak within the l2cap_recv_acldata() function in net/bluetooth/l2cap_core.c. An attacker with physical proximity to device can force the system to leak memory and perform denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU70463

Risk: Medium

CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-3640

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows an attacker to compromise the affected system.

The vulnerability exists due to a use-after-free error in the 2cap_conn_del() function in net/bluetooth/l2cap_core.c in Linux kernel. An attacker with physical proximity to device can trigger a use-after-free error and execute arbitrary code on the system.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU108366

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49762

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ntfs_attr_find() function in fs/ntfs/attrib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU108232

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49763

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ntfs_read_inode_mount() function in fs/ntfs/inode.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU108253

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49769

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the gfs2_check_sb() function in fs/gfs2/ops_fstype.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU108233

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49770

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ceph_update_snap_trace() function in fs/ceph/snap.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer overflow

EUVDB-ID: #VU108342

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49771

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the list_version_get_needed() and list_versions() functions in drivers/md/dm-ioctl.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Buffer overflow

EUVDB-ID: #VU108384

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49772

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the snd_usbmidi_output_open() function in sound/usb/midi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Resource management error

EUVDB-ID: #VU108369

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49773

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the drivers/gpu/drm/amd/display/dc/dcn314/dcn314_optc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Buffer overflow

EUVDB-ID: #VU108385

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49775

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the tcp_cdg_init() and tcp_cdg_release() functions in net/ipv4/tcp_cdg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer overflow

EUVDB-ID: #VU108360

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49776

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the macvlan_common_setup() function in drivers/net/macvlan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Memory leak

EUVDB-ID: #VU108149

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49777

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the i8042_probe() and i8042_remove() functions in drivers/input/serio/i8042.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Use-after-free

EUVDB-ID: #VU108220

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49779

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __unregister_kprobe_top() function in kernel/kprobes.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) NULL pointer dereference

EUVDB-ID: #VU108278

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49781

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the amd_pmu_handle_irq() function in arch/x86/events/amd/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Resource management error

EUVDB-ID: #VU108376

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49783

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the fpu_clone() function in arch/x86/kernel/fpu/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Memory leak

EUVDB-ID: #VU108193

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49784

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the uncore_clean_online() function in arch/x86/events/amd/uncore.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory leak

EUVDB-ID: #VU108206

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49786

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the blkcg_css_online() function in block/blk-cgroup.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Memory leak

EUVDB-ID: #VU108205

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49787

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the amd_probe() function in drivers/mmc/host/sdhci-pci-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Memory leak

EUVDB-ID: #VU108204

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49788

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qp_notify_peer_local() and qp_notify_peer() functions in drivers/misc/vmw_vmci/vmci_queue_pair.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU108221

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49789

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zfcp_fsf_req_send() function in drivers/s390/scsi/zfcp_fsf.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Buffer overflow

EUVDB-ID: #VU108357

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49790

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the iforce_init_device() function in drivers/input/joystick/iforce/iforce-main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Out-of-bounds read

EUVDB-ID: #VU108242

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49792

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sctp_transport_free() function in net/sctp/transport.c, within the sctp_writeable(), sctp_sendmsg_to_asoc(), sctp_sock_rfree() and sctp_wait_for_sndbuf() functions in net/sctp/socket.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Memory leak

EUVDB-ID: #VU108202

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49793

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iio_sysfs_trigger_remove() function in drivers/iio/trigger/iio-trig-sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Memory leak

EUVDB-ID: #VU108201

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49794

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the at91_adc_allocate_trigger() function in drivers/iio/adc/at91_adc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Memory leak

EUVDB-ID: #VU108207

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49795

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the rethook_alloc() function in kernel/trace/rethook.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) NULL pointer dereference

EUVDB-ID: #VU108262

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49796

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the test_gen_kprobe_cmd() and test_gen_kretprobe_cmd() functions in kernel/trace/kprobe_event_gen_test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) NULL pointer dereference

EUVDB-ID: #VU108279

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49797

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the trace_event_file_is_valid() and kprobe_event_gen_test_init() functions in kernel/trace/kprobe_event_gen_test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Resource management error

EUVDB-ID: #VU108352

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49799

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the register_synth_event() function in kernel/trace/trace_events_synth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Memory leak

EUVDB-ID: #VU108200

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49800

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the test_gen_synth_cmd() and test_empty_synth_event() functions in kernel/trace/synth_event_gen_test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Memory leak

EUVDB-ID: #VU108199

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49801

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tracing_release_pipe() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Improper Initialization

EUVDB-ID: #VU108351

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49802

CWE-ID: CWE-665 - Improper Initialization

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization within the ftrace_add_mod() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Memory leak

EUVDB-ID: #VU108197

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49807

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nvmet_auth_set_key() function in drivers/nvme/target/auth.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Memory leak

EUVDB-ID: #VU108195

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49809

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the x25_lapb_receive_frame() function in net/x25/x25_dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Improper locking

EUVDB-ID: #VU108301

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49810

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the netfs_rreq_unmark_after_write() function in fs/netfs/io.c, within the netfs_rreq_unlock_folios() function in fs/netfs/buffered_read.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Memory leak

EUVDB-ID: #VU108194

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49812

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __br_vlan_set_proto() and ntohs() functions in net/bridge/br_vlan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Memory leak

EUVDB-ID: #VU108192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49813

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ena_init() function in drivers/net/ethernet/amazon/ena/ena_netdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Resource management error

EUVDB-ID: #VU108375

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49818

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the mISDN_register_device() function in drivers/isdn/mISDN/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Memory leak

EUVDB-ID: #VU108175

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49821

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mISDN_dsp_element_register() and device_unregister() functions in drivers/isdn/mISDN/dsp_pipeline.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Memory leak

EUVDB-ID: #VU108176

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49822

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cifs_mount() function in fs/cifs/connect.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) NULL pointer dereference

EUVDB-ID: #VU108282

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49823

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ata_tdev_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) NULL pointer dereference

EUVDB-ID: #VU108283

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49824

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ata_tlink_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) NULL pointer dereference

EUVDB-ID: #VU108284

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49825

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ata_tport_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) NULL pointer dereference

EUVDB-ID: #VU108285

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49826

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ata_tport_add() function in drivers/ata/libata-transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) NULL pointer dereference

EUVDB-ID: #VU108286

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49827

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the drivers/gpu/drm/drm_internal.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory leak

EUVDB-ID: #VU108180

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49830

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the drm_dev_init() function in drivers/gpu/drm/drm_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) NULL pointer dereference

EUVDB-ID: #VU108288

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49832

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pinctrl_dt_to_map() function in drivers/pinctrl/devicetree.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Use-after-free

EUVDB-ID: #VU108223

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49834

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nilfs_remount() function in fs/nilfs2/super.c, within the nilfs_relax_pressure_in_lock(), nilfs_construct_segment(), nilfs_construct_dsync_segment() and nilfs_attach_log_writer() functions in fs/nilfs2/segment.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Memory leak

EUVDB-ID: #VU108181

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49835

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the add_widget_node() function in sound/hda/hdac_sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Memory leak

EUVDB-ID: #VU108171

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49836

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the siox_device_add() function in drivers/siox/siox-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Memory leak

EUVDB-ID: #VU108177

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49837

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __check_func_call() and prepare_func_exit() functions in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) NULL pointer dereference

EUVDB-ID: #VU108277

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49839

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sas_phy_add() function in drivers/scsi/scsi_transport_sas.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Resource management error

EUVDB-ID: #VU108353

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49841

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the drivers/tty/serial/imx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Use-after-free

EUVDB-ID: #VU108225

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49842

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() function in sound/soc/soc-core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Input validation error

EUVDB-ID: #VU108392

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49845

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the j1939_send_one() function in net/can/j1939/main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Out-of-bounds read

EUVDB-ID: #VU108250

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49846

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the udf_find_entry() function in fs/udf/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Improper locking

EUVDB-ID: #VU108303

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49850

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the kvm_gfn_to_pfn_cache_unmap(), kvm_gfn_to_pfn_cache_init() and kvm_gfn_to_pfn_cache_destroy() functions in virt/kvm/pfncache.c, within the kvm_xen_shared_info_init(), kvm_xen_vcpu_set_attr(), kvm_xen_init_vcpu(), kvm_xen_destroy_vcpu() and kvm_xen_destroy_vm() functions in arch/x86/kvm/xen.c, within the kvm_write_system_time(), kvm_pv_enable_async_pf_int() and kvm_arch_vcpu_create() functions in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Memory leak

EUVDB-ID: #VU108184

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49853

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the drivers/net/macvlan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Memory leak

EUVDB-ID: #VU108148

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49858

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the otx2_tx_napi_handler() and otx2_sq_append_skb() functions in drivers/net/ethernet/marvell/octeontx2/nic/otx2_txrx.c, within the otx2_sq_init() function in drivers/net/ethernet/marvell/octeontx2/nic/otx2_common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Memory leak

EUVDB-ID: #VU108147

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49860

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the k3_udma_glue_request_tx_chn(), k3_udma_glue_request_rx_chn_priv() and k3_udma_glue_request_remote_rx_chn() functions in drivers/dma/ti/k3-udma-glue.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Memory leak

EUVDB-ID: #VU108146

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49861

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mv_xor_v2_remove() function in drivers/dma/mv_xor_v2.c. A local user can perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) NULL pointer dereference

EUVDB-ID: #VU108274

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49863

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the can_rx_register() function in net/can/af_can.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) NULL pointer dereference

EUVDB-ID: #VU108273

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49864

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mutex_unlock() function in drivers/gpu/drm/amd/amdkfd/kfd_migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) Use of uninitialized resource

EUVDB-ID: #VU108338

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49865

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ip6addrlbl_putmsg() function in net/ipv6/addrlabel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Input validation error

EUVDB-ID: #VU108387

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49868

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mt7621_pcie_phy_of_xlate() function in drivers/phy/ralink/phy-mt7621-pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) NULL pointer dereference

EUVDB-ID: #VU108272

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49869

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the bnxt_set_coalesce() function in drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Out-of-bounds read

EUVDB-ID: #VU108251

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49870

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the include/uapi/linux/capability.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Memory leak

EUVDB-ID: #VU108143

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49871

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the local_bh_disable() function in drivers/net/tun.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Memory leak

EUVDB-ID: #VU108131

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49874

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mousevsc_probe() function in drivers/hid/hid-hyperv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Improper error handling

EUVDB-ID: #VU108331

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49879

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the make_indexed_dir() function in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Infinite loop

EUVDB-ID: #VU108349

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49880

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the ext4_ext_migrate() function in fs/ext4/migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Memory leak

EUVDB-ID: #VU108138

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49881

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the regdb_fw_cb() and query_regdb_file() functions in net/wireless/reg.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Integer overflow

EUVDB-ID: #VU108341

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49885

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the ghes_unmap() function in drivers/acpi/apei/ghes.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Buffer overflow

EUVDB-ID: #VU108364

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49886

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the VE_GET_PORT_NUM() and tdx_parse_tdinfo() functions in arch/x86/coco/tdx/tdx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Memory leak

EUVDB-ID: #VU108137

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49887

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vdec_probe() function in drivers/staging/media/meson/vdec/vdec.c. A local user can perform a denial of service attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Improper error handling

EUVDB-ID: #VU108332

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49888

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the cortex_a76_erratum_1463225_svc_handler() function in arch/arm64/kernel/entry-common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) NULL pointer dereference

EUVDB-ID: #VU108269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49889

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ring_buffer_wake_waiters() function in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Memory leak

EUVDB-ID: #VU108136

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49890

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cap_inode_getsecurity() function in security/commoncap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Memory leak

EUVDB-ID: #VU108135

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49891

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the test_gen_kprobe_cmd() and test_gen_kretprobe_cmd() functions in kernel/trace/kprobe_event_gen_test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Use-after-free

EUVDB-ID: #VU108227

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49892

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ftrace_shutdown() function in kernel/trace/ftrace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Memory leak

EUVDB-ID: #VU108141

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49900

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the piix4_probe() function in drivers/i2c/busses/i2c-piix4.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Memory leak

EUVDB-ID: #VU108150

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49901

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the blk_mq_init_allocated_queue() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Memory leak

EUVDB-ID: #VU108151

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49902

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bdi_unregister() function in block/genhd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Memory leak

EUVDB-ID: #VU108152

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49905

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the smc_init() and smc_pnet_exit() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Memory leak

EUVDB-ID: #VU108153

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49906

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __ibmvnic_reset() function in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Memory leak

EUVDB-ID: #VU108154

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49908

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the l2cap_recv_acldata() function in net/bluetooth/l2cap_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Use-after-free

EUVDB-ID: #VU108229

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49909

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the l2cap_data_channel() function in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Use-after-free

EUVDB-ID: #VU108230

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49910

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the l2cap_rx_state_recv(), l2cap_rx() and l2cap_stream_rx() functions in net/bluetooth/l2cap_core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Memory leak

EUVDB-ID: #VU108158

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49915

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mISDN_register_device() function in drivers/isdn/mISDN/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Use of uninitialized resource

EUVDB-ID: #VU108339

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49916

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the rose_transmit_clear_request() function in net/rose/rose_link.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Resource management error

EUVDB-ID: #VU108370

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49917

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ip_vs_app_net_init() function in net/netfilter/ipvs/ip_vs_app.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Improper locking

EUVDB-ID: #VU108309

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49918

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ip_vs_conn_net_init() function in net/netfilter/ipvs/ip_vs_conn.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Use-after-free

EUVDB-ID: #VU108219

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49921

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the red_enqueue() function in net/sched/sch_red.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Memory leak

EUVDB-ID: #VU108159

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49922

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nfcmrvl_i2c_nci_send() function in drivers/nfc/nfcmrvl/i2c.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Memory leak

EUVDB-ID: #VU108160

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49923

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nxp_nci_send() function in drivers/nfc/nxp-nci/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Memory leak

EUVDB-ID: #VU108161

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49924

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the fdp_nci_close() function in drivers/nfc/fdp/fdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Improper locking

EUVDB-ID: #VU108311

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49925

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nldev_init() function in drivers/infiniband/core/nldev.c, within the ib_core_init() function in drivers/infiniband/core/device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Memory leak

EUVDB-ID: #VU108188

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49927

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nfs40_init_client() function in fs/nfs/nfs4client.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) NULL pointer dereference

EUVDB-ID: #VU108265

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49928

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rpc_sysfs_client_setup(), rpc_sysfs_xprt_switch_setup() and rpc_sysfs_xprt_setup() functions in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Memory leak

EUVDB-ID: #VU108187

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49929

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the read_reply() function in drivers/infiniband/sw/rxe/rxe_resp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) NULL pointer dereference

EUVDB-ID: #VU108263

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49931

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sc_disable() function in drivers/infiniband/hw/hfi1/pio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Use-after-free

EUVDB-ID: #VU75453

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-1990

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the ndlc_remove() function in drivers/nfc/st-nci/ndlc.c. A local user can trigger a use-after-free error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Out-of-bounds read

EUVDB-ID: #VU75455

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-28866

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in net/bluetooth/hci_sync.c in Linux kernel. An attacker with physical proximity to device can trigger an out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Memory leak

EUVDB-ID: #VU108413

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53035

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nilfs_ioctl_wrap_copy() function in fs/nilfs2/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Improper resource shutdown or release

EUVDB-ID: #VU108509

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53036

CWE-ID: CWE-404 - Improper Resource Shutdown or Release

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to failure to properly release resources within the amdgpu_bo_release_notify() function in drivers/gpu/drm/amd/amdgpu/amdgpu_object.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) NULL pointer dereference

EUVDB-ID: #VU108466

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53038

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lpfc_read_object() function in drivers/scsi/lpfc/lpfc_sli.c, within the lpfc_sli4_cgn_params_read() function in drivers/scsi/lpfc/lpfc_init.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Double free

EUVDB-ID: #VU108487

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53039

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the void recv_ipc() and ish_dev_init() functions in drivers/hid/intel-ish-hid/ipc/ipc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Buffer overflow

EUVDB-ID: #VU108491

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53040

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ca8210_skb_tx() function in drivers/net/ieee802154/ca8210.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Improper locking

EUVDB-ID: #VU108469

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53041

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __qla2x00_abort_all_cmds() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Integer underflow

EUVDB-ID: #VU108490

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53042

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the dcn30_prepare_bandwidth() function in drivers/gpu/drm/amd/display/dc/dcn30/dcn30_hwseq.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) NULL pointer dereference

EUVDB-ID: #VU108465

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53044

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the alloc_dev() function in drivers/md/dm.c, within the dm_stat_in_flight() and dm_stats_init() functions in drivers/md/dm-stats.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Improper locking

EUVDB-ID: #VU108470

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53045

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the g_audio_cleanup() function in drivers/usb/gadget/function/u_audio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) NULL pointer dereference

EUVDB-ID: #VU108464

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53049

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ucsi_init() function in drivers/usb/typec/ucsi/ucsi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Improper locking

EUVDB-ID: #VU108472

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53052

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the tconInfoAlloc() and tconInfoFree() functions in fs/cifs/misc.c, within the DECLARE_RWSEM(), dfs_cache_destroy(), dfs_cache_add_refsrv_session() and dfs_cache_remount_fs() functions in fs/cifs/dfs_cache.c, within the get_session(), get_dfs_conn(), __dfs_mount_share() and dfs_mount_share() functions in fs/cifs/dfs.c, within the cifs_mount() and cifs_umount() functions in fs/cifs/connect.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Memory leak

EUVDB-ID: #VU108415

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53054

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dwc2_get_dr_mode(), __dwc2_lowlevel_hw_enable() and __dwc2_lowlevel_hw_disable() functions in drivers/usb/dwc2/platform.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) NULL pointer dereference

EUVDB-ID: #VU108462

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53056

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qla2x00_get_sp_from_handle() and qla25xx_process_bidir_status_iocb() functions in drivers/scsi/qla2xxx/qla_isr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Out-of-bounds read

EUVDB-ID: #VU108439

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53057

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the void recv_ipc() and ish_dev_init() functions in drivers/hid/intel-ish-hid/ipc/ipc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Improper error handling

EUVDB-ID: #VU108488

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53058

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the mlx5_esw_acl_ingress_vport_bond_update() function in drivers/net/ethernet/mellanox/mlx5/core/esw/acl/ingress_ofld.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Memory leak

EUVDB-ID: #VU108416

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53059

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cros_ec_chardev_ioctl_xcmd() function in drivers/platform/chrome/cros_ec_chardev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Improper locking

EUVDB-ID: #VU108473

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53060

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the igb_remove() function in drivers/net/ethernet/intel/igb/igb_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Memory leak

EUVDB-ID: #VU108418

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53062

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the smsc95xx_rx_fixup() function in drivers/net/usb/smsc95xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Resource management error

EUVDB-ID: #VU108504

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53064

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the iavf_remove() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Out-of-bounds read

EUVDB-ID: #VU108440

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53065

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the perf_event_bpf_output() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) NULL pointer dereference

EUVDB-ID: #VU108461

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53066

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the qed_iov_configure_min_tx_rate() and qed_iov_handle_trust_change() functions in drivers/net/ethernet/qlogic/qed/qed_sriov.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Memory leak

EUVDB-ID: #VU108419

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53068

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the lan78xx_rx() function in drivers/net/usb/lan78xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Improper locking

EUVDB-ID: #VU108475

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53070

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the topology_get_acpi_cpu_tag() function in drivers/acpi/pptt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) NULL pointer dereference

EUVDB-ID: #VU108460

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53071

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mt76_register_phy(), mt76_unregister_phy(), mt76_register_device() and mt76_unregister_device() functions in drivers/net/wireless/mediatek/mt76/mac80211.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Improper error handling

EUVDB-ID: #VU108489

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53073

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the amd_pmu_v2_handle_irq() function in arch/x86/events/amd/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Improper locking

EUVDB-ID: #VU108476

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53074

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the psp_hdcp_initialize(), psp_dtm_initialize() and psp_rap_initialize() functions in drivers/gpu/drm/amd/amdgpu/amdgpu_psp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Use-after-free

EUVDB-ID: #VU108435

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53075

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lookup_rec() function in kernel/trace/ftrace.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Out-of-bounds read

EUVDB-ID: #VU108441

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53077

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the CalculateVMAndRowBytes() function in drivers/gpu/drm/amd/display/dc/dml/dcn30/display_mode_vba_30.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Memory leak

EUVDB-ID: #VU108421

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53078

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the alua_activate() function in drivers/scsi/device_handler/scsi_dh_alua.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) NULL pointer dereference

EUVDB-ID: #VU108459

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53079

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the esw_disable_vport() function in drivers/net/ethernet/mellanox/mlx5/core/eswitch.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Buffer overflow

EUVDB-ID: #VU108496

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53081

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ocfs2_write_end_nolock() function in fs/ocfs2/aops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Use-after-free

EUVDB-ID: #VU108434

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53082

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vp_vdpa_remove() function in drivers/vdpa/virtio_pci/vp_vdpa.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Use-after-free

EUVDB-ID: #VU108424

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53084

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drm_gem_shmem_mmap() function in drivers/gpu/drm/drm_gem_shmem_helper.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Buffer overflow

EUVDB-ID: #VU108498

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53087

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the replace_barrier() and i915_active_add_request() functions in drivers/gpu/drm/i915/i915_active.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Infinite loop

EUVDB-ID: #VU108493

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53089

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the ext4_xattr_inode_iget() function in fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Use-after-free

EUVDB-ID: #VU108431

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53090

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the alloc_event_waiters() function in drivers/gpu/drm/amd/amdkfd/kfd_events.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) NULL pointer dereference

EUVDB-ID: #VU108458

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53091

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ext4_load_journal() function in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Memory leak

EUVDB-ID: #VU108423

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53092

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the exynos_generic_icc_probe() function in drivers/interconnect/samsung/exynos.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Resource management error

EUVDB-ID: #VU108495

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53093

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __create_val_field() function in kernel/trace/trace_events_hist.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) NULL pointer dereference

EUVDB-ID: #VU108456

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53095

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ttm_device_swapout() function in drivers/gpu/drm/ttm/ttm_device.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Memory leak

EUVDB-ID: #VU108400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53096

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the icc_node_destroy() function in drivers/interconnect/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) NULL pointer dereference

EUVDB-ID: #VU108455

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53098

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gpio_ir_recv_probe() and MODULE_DEVICE_TABLE() functions in drivers/media/rc/gpio-ir-recv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) Use-after-free

EUVDB-ID: #VU108430

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53099

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the do_feature_check_call() function in drivers/firmware/xilinx/zynqmp.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) Resource management error

EUVDB-ID: #VU108505

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53100

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the fs/ext4/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) Resource management error

EUVDB-ID: #VU108506

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53101

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the swap_inode_boot_loader() function in fs/ext4/ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) NULL pointer dereference

EUVDB-ID: #VU108454

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53102

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ice_qp_dis() function in drivers/net/ethernet/intel/ice/ice_xsk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) NULL pointer dereference

EUVDB-ID: #VU108453

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53105

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5e_tc_esw_cleanup() function in drivers/net/ethernet/mellanox/mlx5/core/en_tc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Use-after-free

EUVDB-ID: #VU108429

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53106

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL() function in drivers/nfc/st-nci/ndlc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Improper locking

EUVDB-ID: #VU108479

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53108

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the net/iucv/iucv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Improper locking

EUVDB-ID: #VU108480

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53109

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the LL_RESERVED_SPACE() function in net/ipv6/ip6_tunnel.c, within the ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Use-after-free

EUVDB-ID: #VU108428

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53111

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the loop_queue_rq() function in drivers/block/loop.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Out-of-bounds read

EUVDB-ID: #VU108442

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53112

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drivers/gpu/drm/i915/gt/intel_sseu.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) NULL pointer dereference

EUVDB-ID: #VU108451

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53114

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the i40e_init_recovery_mode() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Use-after-free

EUVDB-ID: #VU108427

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53116

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __nvmet_req_complete() function in drivers/nvme/target/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Incorrect calculation

EUVDB-ID: #VU108507

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53118

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) NULL pointer dereference

EUVDB-ID: #VU108450

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53119

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the pn533_usb_send_frame() function in drivers/nfc/pn533/usb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Use-after-free

EUVDB-ID: #VU108426

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53123

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pci_bus_resource_n() function in drivers/pci/bus.c, within the zpci_bus_prepare_device() function in arch/s390/pci/pci_bus.c, within the __alloc_res() and zpci_setup_bus_resources() functions in arch/s390/pci/pci.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) NULL pointer dereference

EUVDB-ID: #VU108448

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53124

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mpt3sas_transport_port_add() function in drivers/scsi/mpt3sas/mpt3sas_transport.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Memory leak

EUVDB-ID: #VU108411

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53125

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the smsc75xx_rx_fixup() function in drivers/net/usb/smsc75xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Memory leak

EUVDB-ID: #VU108408

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53128

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mpi3mr_free_mem() function in drivers/scsi/mpi3mr/mpi3mr_fw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Memory leak

EUVDB-ID: #VU108406

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53131

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the svc_start_kthreads() and svc_stop_kthreads() functions in net/sunrpc/svc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Buffer overflow

EUVDB-ID: #VU108501

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53134

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the bnxt_alloc_ring(), bnxt_free_tpa_info() and bnxt_alloc_tpa_info() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Improper locking

EUVDB-ID: #VU108483

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53137

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_rename() and ext4_journal_stop() functions in fs/ext4/namei.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Out-of-bounds read

EUVDB-ID: #VU108445

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53139

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the fdp_nci_i2c_read_device_properties() and dev_dbg() functions in drivers/nfc/fdp/i2c.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Memory leak

EUVDB-ID: #VU108403

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53140

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the scsi_remove_host() and scsi_host_dev_release() functions in drivers/scsi/hosts.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Buffer overflow

EUVDB-ID: #VU108492

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53142

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ice_get_module_eeprom() function in drivers/net/ethernet/intel/ice/ice_ethtool.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Input validation error

EUVDB-ID: #VU108486

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53143

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ext4_getfsmap_datadev() function in fs/ext4/fsmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Use-after-free

EUVDB-ID: #VU109252

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53145

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btsdio_remove() function in drivers/bluetooth/btsdio.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Use-after-free

EUVDB-ID: #VU90212

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26804

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tnl_update_pmtu(), ip_md_tunnel_xmit() and ip_tunnel_xmit() functions in net/ipv4/ip_tunnel.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Use-after-free

EUVDB-ID: #VU102061

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53168

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the xs_create_sock() function in net/sunrpc/xprtsock.c, within the svc_create_socket() function in net/sunrpc/svcsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Use-after-free

EUVDB-ID: #VU102042

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56558

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the e_show() function in fs/nfsd/export.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Use-after-free

EUVDB-ID: #VU106955

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21999

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the proc_get_inode() function in fs/proc/inode.c, within the proc_create_reg(), proc_create_seq_private() and proc_create_single_data() functions in fs/proc/generic.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Resource management error

EUVDB-ID: #VU107782

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2025-22056

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nft_tunnel_obj_geneve_init() and nft_tunnel_opts_dump() functions in net/netfilter/nft_tunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

177) NULL pointer dereference

EUVDB-ID: #VU108299

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23145

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) Input validation error

EUVDB-ID: #VU108394

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37789

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the validate_set() function in net/openvswitch/flow_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.97.1

kernel-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-devel: before 5.14.21-150500.13.97.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt: before 5.14.21-150500.13.97.1

kernel-syms-rt: before 5.14.21-150500.13.97.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-devel: before 5.14.21-150500.13.97.1

dlm-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.97.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-debugsource: before 5.14.21-150500.13.97.1

kernel-rt-extra: before 5.14.21-150500.13.97.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.97.1

reiserfs-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.97.1

ocfs2-kmp-rt: before 5.14.21-150500.13.97.1

gfs2-kmp-rt: before 5.14.21-150500.13.97.1

cluster-md-kmp-rt: before 5.14.21-150500.13.97.1

kernel-rt-debuginfo: before 5.14.21-150500.13.97.1

kernel-rt-vdso: before 5.14.21-150500.13.97.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.97.1

kernel-rt-optional: before 5.14.21-150500.13.97.1

kernel-devel-rt: before 5.14.21-150500.13.97.1

kernel-source-rt: before 5.14.21-150500.13.97.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###