SUSE update for the Linux Kernel



Risk High
Patch available YES
Number of vulnerabilities 119
CVE-ID CVE-2023-53034
CVE-2024-27018
CVE-2024-27415
CVE-2024-28956
CVE-2024-35840
CVE-2024-46713
CVE-2024-46763
CVE-2024-46865
CVE-2024-50083
CVE-2024-50106
CVE-2024-50223
CVE-2024-54458
CVE-2024-56641
CVE-2024-56702
CVE-2024-57998
CVE-2024-58001
CVE-2024-58070
CVE-2024-58093
CVE-2024-58094
CVE-2024-58095
CVE-2024-58096
CVE-2024-58097
CVE-2025-21648
CVE-2025-21683
CVE-2025-21702
CVE-2025-21707
CVE-2025-21758
CVE-2025-21768
CVE-2025-21787
CVE-2025-21792
CVE-2025-21814
CVE-2025-21852
CVE-2025-21853
CVE-2025-21919
CVE-2025-21929
CVE-2025-21962
CVE-2025-21963
CVE-2025-21964
CVE-2025-22018
CVE-2025-22021
CVE-2025-22025
CVE-2025-22027
CVE-2025-22030
CVE-2025-22033
CVE-2025-22044
CVE-2025-22050
CVE-2025-22056
CVE-2025-22057
CVE-2025-22058
CVE-2025-22062
CVE-2025-22063
CVE-2025-22064
CVE-2025-22065
CVE-2025-22070
CVE-2025-22075
CVE-2025-22085
CVE-2025-22086
CVE-2025-22088
CVE-2025-22091
CVE-2025-22093
CVE-2025-22094
CVE-2025-22097
CVE-2025-22102
CVE-2025-22103
CVE-2025-22104
CVE-2025-22107
CVE-2025-22108
CVE-2025-22109
CVE-2025-22112
CVE-2025-22116
CVE-2025-22125
CVE-2025-22126
CVE-2025-22128
CVE-2025-23129
CVE-2025-23131
CVE-2025-23134
CVE-2025-23136
CVE-2025-23138
CVE-2025-23140
CVE-2025-23145
CVE-2025-23150
CVE-2025-23154
CVE-2025-23160
CVE-2025-37747
CVE-2025-37748
CVE-2025-37749
CVE-2025-37750
CVE-2025-37755
CVE-2025-37773
CVE-2025-37780
CVE-2025-37787
CVE-2025-37789
CVE-2025-37790
CVE-2025-37797
CVE-2025-37798
CVE-2025-37799
CVE-2025-37803
CVE-2025-37804
CVE-2025-37809
CVE-2025-37820
CVE-2025-37823
CVE-2025-37824
CVE-2025-37829
CVE-2025-37830
CVE-2025-37831
CVE-2025-37833
CVE-2025-37842
CVE-2025-37870
CVE-2025-37879
CVE-2025-37886
CVE-2025-37887
CVE-2025-37949
CVE-2025-37957
CVE-2025-37958
CVE-2025-37960
CVE-2025-37974
CVE-2025-38152
CVE-2025-38637
CVE-2025-40325
CWE-ID CWE-125
CWE-399
CWE-667
CWE-476
CWE-908
CWE-416
CWE-617
CWE-20
CWE-835
CWE-119
CWE-401
CWE-190
CWE-682
CWE-388
CWE-191
CWE-366
Exploitation vector Local
Public exploit Public exploit code for vulnerability #47 is available.
Vulnerable software
SUSE Real Time Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

kernel-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-syms-rt
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-6_4_0-150700_7_3-rt
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 119 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU107691

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53034

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the switchtec_ntb_mw_set_trans() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource management error

EUVDB-ID: #VU93196

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27018

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to resource management error within the nf_ct_bridge_pre() function in net/bridge/netfilter/nf_conntrack_bridge.c, within the br_nf_local_in() function in net/bridge/br_netfilter_hooks.c, within the br_netif_receive_skb(), br_pass_frame_up(), br_handle_frame_finish() and br_handle_frame() functions in net/bridge/br_input.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU91317

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27415

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nf_conntrack_init_end() function in net/netfilter/nf_conntrack_core.c, within the nf_ct_bridge_pre() function in net/bridge/netfilter/nf_conntrack_bridge.c, within the IS_ENABLED() and br_nf_pre_routing() functions in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU109000

Risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-28956

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a malicious guest to escalate privileges on the system.

The vulnerability exists due to an error in the hardware support for prediction-domain isolation dubbed "Indirect Target Selection". A malicious guest can infer the contents of arbitrary host memory, including memory assigned to other guests.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource management error

EUVDB-ID: #VU93429

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35840

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the subflow_finish_connect() function in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Improper locking

EUVDB-ID: #VU97313

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46713

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ring_buffer_init() function in kernel/events/ring_buffer.c, within the put_ctx(), perf_mmap_close(), perf_mmap() and atomic_dec() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) NULL pointer dereference

EUVDB-ID: #VU97523

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46763

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the fou_from_sock(), fou_gro_receive(), fou_gro_complete() and gue_gro_receive() functions in net/ipv4/fou.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use of uninitialized resource

EUVDB-ID: #VU97817

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46865

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the gue_gro_receive() function in net/ipv4/fou.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Resource management error

EUVDB-ID: #VU99458

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50083

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tcp_can_coalesce_send_queue_head() function in net/ipv4/tcp_output.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU99802

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50106

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the destroy_delegation(), nfsd4_revoke_states(), nfs4_laundromat(), nfsd4_free_stateid() and nfsd4_delegreturn() functions in fs/nfsd/nfs4state.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) NULL pointer dereference

EUVDB-ID: #VU100174

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50223

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vma_next() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Use-after-free

EUVDB-ID: #VU104956

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-54458

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ufs_bsg_remove() function in drivers/ufs/core/ufs_bsg.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Resource management error

EUVDB-ID: #VU102228

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56641

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) NULL pointer dereference

EUVDB-ID: #VU102103

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56702

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the SEC() function in tools/testing/selftests/bpf/progs/test_tp_btf_nullable.c, within the reg_btf_record(), check_ptr_to_btf_access(), check_mem_access(), check_func_arg(), btf_check_func_arg_match(), check_kfunc_args(), sanitize_check_bounds(), adjust_ptr_min_max_vals() and convert_ctx_accesses() functions in kernel/bpf/verifier.c, within the btf_ctx_access() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Reachable assertion

EUVDB-ID: #VU105038

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57998

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the _find_opp_table(), _opp_table_find_key(), _find_key(), _find_key_exact(), _opp_table_find_key_ceil(), _find_key_ceil(), dev_pm_opp_find_freq_exact_indexed(), dev_pm_opp_find_freq_ceil_indexed(), dev_pm_opp_find_freq_floor_indexed(), dev_pm_opp_remove(), _opp_add_v1(), _opp_set_availability() and dev_pm_opp_adjust_voltage() functions in drivers/opp/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Resource management error

EUVDB-ID: #VU105070

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58001

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ocfs2_fast_symlink_read_folio() function in fs/ocfs2/symlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Improper locking

EUVDB-ID: #VU105413

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58070

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the bpf_local_storage_map_alloc() function in kernel/bpf/bpf_local_storage.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Use-after-free

EUVDB-ID: #VU107678

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58093

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pcie_aspm_exit_link_state() function in drivers/pci/pcie/aspm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Input validation error

EUVDB-ID: #VU107807

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58094

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the jfs_truncate_nolock() function in fs/jfs/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Input validation error

EUVDB-ID: #VU107754

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58095

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the extAlloc() and extRecord() functions in fs/jfs/jfs_extent.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Resource management error

EUVDB-ID: #VU107767

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58096

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ath11k_dp_rx_mon_dest_process(), ath11k_dp_full_mon_process_rx() and ath11k_hal_srng_access_end() functions in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Infinite loop

EUVDB-ID: #VU107762

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58097

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the ath11k_dp_rx_mon_mpdu_pop() and ath11k_dp_rx_full_mon_mpdu_pop() functions in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Buffer overflow

EUVDB-ID: #VU103047

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21648

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the nf_ct_alloc_hashtable() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Memory leak

EUVDB-ID: #VU103510

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21683

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the BPF_CALL_4() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Resource management error

EUVDB-ID: #VU104074

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21702

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use of uninitialized resource

EUVDB-ID: #VU105042

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21707

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the mptcp_parse_option() and mptcp_get_options() functions in net/mptcp/options.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Buffer overflow

EUVDB-ID: #VU105082

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21758

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Memory leak

EUVDB-ID: #VU104939

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21768

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the seg6_output_core() function in net/ipv6/seg6_iptunnel.c, within the rpl_output() function in net/ipv6/rpl_iptunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Input validation error

EUVDB-ID: #VU105035

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21787

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the team_nl_options_set_doit() function in drivers/net/team/team_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Memory leak

EUVDB-ID: #VU104942

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21792

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ax25_setsockopt() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) NULL pointer dereference

EUVDB-ID: #VU105141

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21814

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ptp_getcycles64() and ptp_clock_register() functions in drivers/ptp/ptp_clock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) NULL pointer dereference

EUVDB-ID: #VU105664

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21852

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Use-after-free

EUVDB-ID: #VU105651

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21853

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bpf_map_mmap() function in kernel/bpf/syscall.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Input validation error

EUVDB-ID: #VU106804

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21919

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the child_cfs_rq_on_list() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Use-after-free

EUVDB-ID: #VU106601

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21929

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hid_ishtp_cl_remove() function in drivers/hid/intel-ish-hid/ishtp-hid-client.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Integer overflow

EUVDB-ID: #VU106841

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21962

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Integer overflow

EUVDB-ID: #VU106842

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21963

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Integer overflow

EUVDB-ID: #VU106843

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21964

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) NULL pointer dereference

EUVDB-ID: #VU107728

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22018

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the MPOA_cache_impos_rcvd() function in net/atm/mpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Resource management error

EUVDB-ID: #VU107786

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22021

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nf_sk_lookup_slow_v6() function in net/ipv6/netfilter/nf_socket_ipv6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Memory leak

EUVDB-ID: #VU107655

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22025

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nfs4_alloc_open_stateid() and nfsd_break_one_deleg() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) NULL pointer dereference

EUVDB-ID: #VU107717

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22027

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the streamzap_disconnect() function in drivers/media/rc/streamzap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Use-after-free

EUVDB-ID: #VU107677

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22030

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the zswap_cpu_comp_dead() function in mm/zswap.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) NULL pointer dereference

EUVDB-ID: #VU107720

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22033

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the do_compat_alignment_fixup() function in arch/arm64/kernel/compat_alignment.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Resource management error

EUVDB-ID: #VU107784

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22044

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) NULL pointer dereference

EUVDB-ID: #VU107722

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22050

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the drivers/net/usb/usbnet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Resource management error

EUVDB-ID: #VU107782

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2025-22056

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nft_tunnel_obj_geneve_init() and nft_tunnel_opts_dump() functions in net/netfilter/nft_tunnel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

48) Use-after-free

EUVDB-ID: #VU107671

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the dst_count_dec() function in net/core/dst.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Memory leak

EUVDB-ID: #VU107656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22058

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the udp_skb_has_head_state(), udp_rmem_release(), EXPORT_SYMBOL_GPL() and first_packet_length() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) NULL pointer dereference

EUVDB-ID: #VU107727

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22062

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_auth() and proc_sctp_do_udp_port() functions in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) NULL pointer dereference

EUVDB-ID: #VU107716

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22063

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the calipso_sock_getattr() and calipso_sock_setattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Incorrect calculation

EUVDB-ID: #VU107788

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22064

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the nf_tables_updchain() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) NULL pointer dereference

EUVDB-ID: #VU107715

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22065

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the idpf_shutdown() function in drivers/net/ethernet/intel/idpf/idpf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) NULL pointer dereference

EUVDB-ID: #VU107713

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22070

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the v9fs_vfs_mkdir_dotl() function in fs/9p/vfs_inode_dotl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) Improper locking

EUVDB-ID: #VU107746

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22075

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rtnl_vfinfo_size() function in net/core/rtnetlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Use-after-free

EUVDB-ID: #VU107668

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22085

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ib_device_notify_register() function in drivers/infiniband/core/device.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) NULL pointer dereference

EUVDB-ID: #VU107711

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22086

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ntohl() function in drivers/infiniband/hw/mlx5/cq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Use-after-free

EUVDB-ID: #VU107667

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22088

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the erdma_cancel_mpatimer() function in drivers/infiniband/hw/erdma/erdma_cm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Buffer overflow

EUVDB-ID: #VU107763

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22091

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the create_mkey_callback(), alloc_cacheable_mr(), reg_create() and create_real_mr() functions in drivers/infiniband/hw/mlx5/mr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) NULL pointer dereference

EUVDB-ID: #VU107708

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22093

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dmub_hw_lock_mgr_inbox0_cmd() function in drivers/gpu/drm/amd/display/dc/dce/dmub_hw_lock_mgr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) NULL pointer dereference

EUVDB-ID: #VU107707

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22094

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the vpa_pmu_del() function in arch/powerpc/perf/vpa-pmu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Use-after-free

EUVDB-ID: #VU107666

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22097

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vkms_init() and vkms_destroy() functions in drivers/gpu/drm/vkms/vkms_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) Improper locking

EUVDB-ID: #VU107744

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22102

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nxp_download_firmware() function in drivers/bluetooth/btnxpuart.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) NULL pointer dereference

EUVDB-ID: #VU107705

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22103

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ipvlan_l3s_unregister() function in drivers/net/ipvlan/ipvlan_l3s.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Out-of-bounds read

EUVDB-ID: #VU107688

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22104

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vnic_add_client_data(), send_login(), handle_query_ip_offload_rsp() and handle_login_rsp() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Out-of-bounds read

EUVDB-ID: #VU107685

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22107

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sja1105_table_delete_entry() function in drivers/net/dsa/sja1105/sja1105_static_config.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Input validation error

EUVDB-ID: #VU107800

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22108

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bnxt_xmit_bd() function in drivers/net/ethernet/broadcom/bnxt/bnxt_xdp.c, within the bnxt_start_xmit() and dma_unmap_addr_set() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Memory leak

EUVDB-ID: #VU107653

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22109

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ax25_get_route() function in net/ax25/ax25_route.c, within the ax25_connect() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Buffer overflow

EUVDB-ID: #VU107792

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22112

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the bnxt_queue_start() and bnxt_queue_stop() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) Improper error handling

EUVDB-ID: #VU107756

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22116

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the idpf_stop() and idpf_init_task() functions in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Improper locking

EUVDB-ID: #VU107741

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22125

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the raid10_read_request() and raid10_write_one_disk() functions in drivers/md/raid10.c, within the raid1_read_request() and raid1_write_request() functions in drivers/md/raid1.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Use-after-free

EUVDB-ID: #VU107662

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22126

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __mddev_put(), md_seq_show(), EXPORT_SYMBOL_GPL(), md_notify_reboot(), md_autostart_arrays() and md_exit() functions in drivers/md/md.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Resource management error

EUVDB-ID: #VU107765

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22128

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ath12k_pci_probe() function in drivers/net/wireless/ath/ath12k/pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Resource management error

EUVDB-ID: #VU107766

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23129

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the __free_irq() function in drivers/net/wireless/ath/ath11k/pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) NULL pointer dereference

EUVDB-ID: #VU107704

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23131

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the new_lockspace() function in fs/dlm/lockspace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Improper locking

EUVDB-ID: #VU107737

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23134

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snd_timer_user_copy_id(), snd_timer_user_ginfo() and snd_timer_user_gstatus() functions in sound/core/timer.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) NULL pointer dereference

EUVDB-ID: #VU107703

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23136

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the int3402_thermal_probe() function in drivers/thermal/intel/int340x_thermal/int3402_thermal.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Integer underflow

EUVDB-ID: #VU107761

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23138

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the watch_queue_set_size() function in kernel/watch_queue.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Memory leak

EUVDB-ID: #VU108213

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23140

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pci_endpoint_test_release_irq() function in drivers/misc/pci_endpoint_test.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) NULL pointer dereference

EUVDB-ID: #VU108299

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23145

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Use-after-free

EUVDB-ID: #VU108247

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23150

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the do_split() function in fs/ext4/namei.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Resource management error

EUVDB-ID: #VU108382

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23154

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the io_sendmsg_prep() function in io_uring/net.c, within the ~() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Memory leak

EUVDB-ID: #VU108214

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23160

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mtk_vcodec_fw_scp_init() function in drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Memory leak

EUVDB-ID: #VU108217

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37747

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the exclusive_event_installable(), _free_event(), perf_remove_from_owner(), list_del(), perf_pending_task(), __perf_event_overflow(), perf_event_alloc(), perf_event_exit_event() and perf_free_event() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) NULL pointer dereference

EUVDB-ID: #VU108296

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37748

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mtk_iommu_probe() function in drivers/iommu/mtk_iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Out-of-bounds read

EUVDB-ID: #VU108258

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37749

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ppp_sync_txmunge() function in drivers/net/ppp/ppp_synctty.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Use-after-free

EUVDB-ID: #VU108240

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37750

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the decrypt_raw_data() function in fs/smb/client/smb2ops.c, within the cifs_crypto_secmech_release() function in fs/smb/client/cifsencrypt.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) NULL pointer dereference

EUVDB-ID: #VU108295

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37755

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the wx_alloc_mapped_page() function in drivers/net/ethernet/wangxun/libwx/wx_lib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Input validation error

EUVDB-ID: #VU108388

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37773

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the virtio_fs_get_tree() function in fs/fuse/virtio_fs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) Out-of-bounds read

EUVDB-ID: #VU108255

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37780

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the isofs_fh_to_parent() function in fs/isofs/export.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Input validation error

EUVDB-ID: #VU108389

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37787

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mv88e6xxx_teardown_devlink_regions_global() function in drivers/net/dsa/mv88e6xxx/devlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Input validation error

EUVDB-ID: #VU108394

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37789

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the validate_set() function in net/openvswitch/flow_netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Input validation error

EUVDB-ID: #VU108395

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37790

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the mctp_sk_hash() function in net/mctp/af_mctp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Input validation error

EUVDB-ID: #VU108391

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37797

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hfsc_change_class() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Input validation error

EUVDB-ID: #VU108390

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37798

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qdisc_bstats_update() function in net/sched/sch_fq_codel.c, within the codel_qdisc_dequeue() function in net/sched/sch_codel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) Memory leak

EUVDB-ID: #VU108401

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37799

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vmxnet3_process_xdp() function in drivers/net/vmxnet3/vmxnet3_xdp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Buffer overflow

EUVDB-ID: #VU108822

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37803

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the udmabuf_create() function in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Race condition within a thread

EUVDB-ID: #VU108819

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37804

CWE-ID: CWE-366 - Race Condition within a Thread

Exploit availability: No

Description

The vulnerability allows a local user to corrupt data.

The vulnerability exists due to a data race within the io_wq_free_work() function in io_uring/io_uring.c. A local user can corrupt data.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) NULL pointer dereference

EUVDB-ID: #VU108799

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37809

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the typec_register_partner(), typec_unregister_partner(), typec_get_partner(), typec_partner_attach(), typec_partner_deattach() and typec_register_port() functions in drivers/usb/typec/class.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Memory leak

EUVDB-ID: #VU108789

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37820

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xennet_run_xdp() function in drivers/net/xen-netfront.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Input validation error

EUVDB-ID: #VU108825

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37823

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hfsc_dequeue() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) NULL pointer dereference

EUVDB-ID: #VU108803

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37824

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tipc_mon_reinit_self() function in net/tipc/monitor.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) NULL pointer dereference

EUVDB-ID: #VU108805

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37829

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the scpi_cpufreq_get_rate() function in drivers/cpufreq/scpi-cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) NULL pointer dereference

EUVDB-ID: #VU108806

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37830

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the scmi_cpufreq_get_rate() function in drivers/cpufreq/scmi-cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) NULL pointer dereference

EUVDB-ID: #VU108807

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37831

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the apple_soc_cpufreq_get_rate() function in drivers/cpufreq/apple-soc-cpufreq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Resource management error

EUVDB-ID: #VU108821

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37833

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the niu_try_msix() function in drivers/net/ethernet/sun/niu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) Resource management error

EUVDB-ID: #VU108892

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37842

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the fsl_qspi_cleanup(), fsl_qspi_probe(), fsl_qspi_remove() and module_platform_driver() functions in drivers/spi/spi-fsl-qspi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Input validation error

EUVDB-ID: #VU108902

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37870

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dcn401_enable_stream() function in drivers/gpu/drm/amd/display/dc/hwss/dcn401/dcn401_hwseq.c, within the dcn20_enable_stream() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Incorrect calculation

EUVDB-ID: #VU108897

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37879

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the p9_client_read_once(), p9_client_write(), EXPORT_SYMBOL_GPL() and p9_client_readdir() functions in net/9p/client.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Buffer overflow

EUVDB-ID: #VU108890

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37886

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the pdsc_q_map() function in drivers/net/ethernet/amd/pds_core/core.c, within the pdsc_process_notifyq(), pdsc_process_adminq(), pdsc_adminq_isr(), __pdsc_adminq_post() and pdsc_adminq_post() functions in drivers/net/ethernet/amd/pds_core/adminq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Buffer overflow

EUVDB-ID: #VU108891

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37887

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the pdsc_dl_info_get() function in drivers/net/ethernet/amd/pds_core/devlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Improper locking

EUVDB-ID: #VU109533

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37949

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the xs_suspend_exit(), xs_send(), xs_wait_for_reply(), xenbus_dev_request_and_reply() and xs_talkv() functions in drivers/xen/xenbus/xenbus_xs.c, within the xenbus_dev_queue_reply() function in drivers/xen/xenbus/xenbus_dev_frontend.c, within the process_msg() and process_writes() functions in drivers/xen/xenbus/xenbus_comms.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Use-after-free

EUVDB-ID: #VU109511

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37957

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the shutdown_interception() function in arch/x86/kvm/svm/svm.c, within the kvm_smm_changed() function in arch/x86/kvm/smm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Improper locking

EUVDB-ID: #VU109532

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37958

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __split_huge_pmd_locked() and split_huge_pmd_locked() functions in mm/huge_memory.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Resource management error

EUVDB-ID: #VU109562

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37960

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the memblock_double_array() function in mm/memblock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Input validation error

EUVDB-ID: #VU109586

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37974

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __clp_add() function in arch/s390/pci/pci_clp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) NULL pointer dereference

EUVDB-ID: #VU107697

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38152

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rproc_shutdown() function in drivers/remoteproc/remoteproc_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Improper locking

EUVDB-ID: #VU107732

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38637

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the skbprio_enqueue() and skbprio_dequeue() functions in net/sched/sch_skbprio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Resource management error

EUVDB-ID: #VU107771

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-40325

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the raid10_handle_discard() function in drivers/md/raid10.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Real Time Module: 15-SP7

SUSE Linux Enterprise Live Patching: 15-SP7

SUSE Linux Enterprise Real Time 15: SP7

SUSE Linux Enterprise Server for SAP Applications 15: SP7

SUSE Linux Enterprise Server 15: SP7

kernel-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug: before 6.4.0-150700.7.3.1

kernel-devel-rt: before 6.4.0-150700.7.3.1

kernel-source-rt: before 6.4.0-150700.7.3.1

gfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1

dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1

dlm-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel: before 6.4.0-150700.7.3.1

kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1

gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-syms-rt: before 6.4.0-150700.7.3.1

kernel-rt-devel: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1

cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-rt-debugsource: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1

ocfs2-kmp-rt: before 6.4.0-150700.7.3.1

kernel-rt-debuginfo: before 6.4.0-150700.7.3.1

kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1

kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1

kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###