Risk | High |
Patch available | YES |
Number of vulnerabilities | 119 |
CVE-ID | CVE-2023-53034 CVE-2024-27018 CVE-2024-27415 CVE-2024-28956 CVE-2024-35840 CVE-2024-46713 CVE-2024-46763 CVE-2024-46865 CVE-2024-50083 CVE-2024-50106 CVE-2024-50223 CVE-2024-54458 CVE-2024-56641 CVE-2024-56702 CVE-2024-57998 CVE-2024-58001 CVE-2024-58070 CVE-2024-58093 CVE-2024-58094 CVE-2024-58095 CVE-2024-58096 CVE-2024-58097 CVE-2025-21648 CVE-2025-21683 CVE-2025-21702 CVE-2025-21707 CVE-2025-21758 CVE-2025-21768 CVE-2025-21787 CVE-2025-21792 CVE-2025-21814 CVE-2025-21852 CVE-2025-21853 CVE-2025-21919 CVE-2025-21929 CVE-2025-21962 CVE-2025-21963 CVE-2025-21964 CVE-2025-22018 CVE-2025-22021 CVE-2025-22025 CVE-2025-22027 CVE-2025-22030 CVE-2025-22033 CVE-2025-22044 CVE-2025-22050 CVE-2025-22056 CVE-2025-22057 CVE-2025-22058 CVE-2025-22062 CVE-2025-22063 CVE-2025-22064 CVE-2025-22065 CVE-2025-22070 CVE-2025-22075 CVE-2025-22085 CVE-2025-22086 CVE-2025-22088 CVE-2025-22091 CVE-2025-22093 CVE-2025-22094 CVE-2025-22097 CVE-2025-22102 CVE-2025-22103 CVE-2025-22104 CVE-2025-22107 CVE-2025-22108 CVE-2025-22109 CVE-2025-22112 CVE-2025-22116 CVE-2025-22125 CVE-2025-22126 CVE-2025-22128 CVE-2025-23129 CVE-2025-23131 CVE-2025-23134 CVE-2025-23136 CVE-2025-23138 CVE-2025-23140 CVE-2025-23145 CVE-2025-23150 CVE-2025-23154 CVE-2025-23160 CVE-2025-37747 CVE-2025-37748 CVE-2025-37749 CVE-2025-37750 CVE-2025-37755 CVE-2025-37773 CVE-2025-37780 CVE-2025-37787 CVE-2025-37789 CVE-2025-37790 CVE-2025-37797 CVE-2025-37798 CVE-2025-37799 CVE-2025-37803 CVE-2025-37804 CVE-2025-37809 CVE-2025-37820 CVE-2025-37823 CVE-2025-37824 CVE-2025-37829 CVE-2025-37830 CVE-2025-37831 CVE-2025-37833 CVE-2025-37842 CVE-2025-37870 CVE-2025-37879 CVE-2025-37886 CVE-2025-37887 CVE-2025-37949 CVE-2025-37957 CVE-2025-37958 CVE-2025-37960 CVE-2025-37974 CVE-2025-38152 CVE-2025-38637 CVE-2025-40325 |
CWE-ID | CWE-125 CWE-399 CWE-667 CWE-476 CWE-908 CWE-416 CWE-617 CWE-20 CWE-835 CWE-119 CWE-401 CWE-190 CWE-682 CWE-388 CWE-191 CWE-366 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #47 is available. |
Vulnerable software |
SUSE Real Time Module Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system kernel-rt Operating systems & Components / Operating system package or component kernel-rt_debug Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-syms-rt Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-6_4_0-150700_7_3-rt Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 119 vulnerabilities.
EUVDB-ID: #VU107691
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53034
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the switchtec_ntb_mw_set_trans() function in drivers/ntb/hw/mscc/ntb_hw_switchtec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93196
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27018
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to resource management error within the nf_ct_bridge_pre() function in net/bridge/netfilter/nf_conntrack_bridge.c, within the br_nf_local_in() function in net/bridge/br_netfilter_hooks.c, within the br_netif_receive_skb(), br_pass_frame_up(), br_handle_frame_finish() and br_handle_frame() functions in net/bridge/br_input.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91317
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27415
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nf_conntrack_init_end() function in net/netfilter/nf_conntrack_core.c, within the nf_ct_bridge_pre() function in net/bridge/netfilter/nf_conntrack_bridge.c, within the IS_ENABLED() and br_nf_pre_routing() functions in net/bridge/br_netfilter_hooks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109000
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-28956
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to escalate privileges on the system.
The vulnerability exists due to an error in the hardware support for prediction-domain isolation dubbed "Indirect Target Selection". A malicious guest can infer the contents of arbitrary host memory, including memory assigned to other guests.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93429
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35840
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the subflow_finish_connect() function in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97313
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46713
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ring_buffer_init() function in kernel/events/ring_buffer.c, within the put_ctx(), perf_mmap_close(), perf_mmap() and atomic_dec() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97523
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46763
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fou_from_sock(), fou_gro_receive(), fou_gro_complete() and gue_gro_receive() functions in net/ipv4/fou.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97817
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46865
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the gue_gro_receive() function in net/ipv4/fou.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99458
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50083
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tcp_can_coalesce_send_queue_head() function in net/ipv4/tcp_output.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU99802
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50106
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the destroy_delegation(), nfsd4_revoke_states(), nfs4_laundromat(), nfsd4_free_stateid() and nfsd4_delegreturn() functions in fs/nfsd/nfs4state.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100174
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50223
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vma_next() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104956
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54458
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ufs_bsg_remove() function in drivers/ufs/core/ufs_bsg.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102228
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56641
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the smc_sk_init(), smc_connect_rdma(), smc_connect_ism() and smc_listen_work() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102103
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56702
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the SEC() function in tools/testing/selftests/bpf/progs/test_tp_btf_nullable.c, within the reg_btf_record(), check_ptr_to_btf_access(), check_mem_access(), check_func_arg(), btf_check_func_arg_match(), check_kfunc_args(), sanitize_check_bounds(), adjust_ptr_min_max_vals() and convert_ctx_accesses() functions in kernel/bpf/verifier.c, within the btf_ctx_access() function in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105038
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57998
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the _find_opp_table(), _opp_table_find_key(), _find_key(), _find_key_exact(), _opp_table_find_key_ceil(), _find_key_ceil(), dev_pm_opp_find_freq_exact_indexed(), dev_pm_opp_find_freq_ceil_indexed(), dev_pm_opp_find_freq_floor_indexed(), dev_pm_opp_remove(), _opp_add_v1(), _opp_set_availability() and dev_pm_opp_adjust_voltage() functions in drivers/opp/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105070
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58001
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ocfs2_fast_symlink_read_folio() function in fs/ocfs2/symlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105413
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58070
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bpf_local_storage_map_alloc() function in kernel/bpf/bpf_local_storage.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107678
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58093
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pcie_aspm_exit_link_state() function in drivers/pci/pcie/aspm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107807
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58094
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the jfs_truncate_nolock() function in fs/jfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107754
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58095
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the extAlloc() and extRecord() functions in fs/jfs/jfs_extent.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107767
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58096
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ath11k_dp_rx_mon_dest_process(), ath11k_dp_full_mon_process_rx() and ath11k_hal_srng_access_end() functions in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107762
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58097
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the ath11k_dp_rx_mon_mpdu_pop() and ath11k_dp_rx_full_mon_mpdu_pop() functions in drivers/net/wireless/ath/ath11k/dp_rx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103047
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21648
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nf_ct_alloc_hashtable() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21683
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the BPF_CALL_4() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104074
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21702
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105042
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21707
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mptcp_parse_option() and mptcp_get_options() functions in net/mptcp/options.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105082
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21758
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the mld_newpack() function in net/ipv6/mcast.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104939
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21768
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the seg6_output_core() function in net/ipv6/seg6_iptunnel.c, within the rpl_output() function in net/ipv6/rpl_iptunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105035
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21787
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the team_nl_options_set_doit() function in drivers/net/team/team_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104942
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21792
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_setsockopt() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105141
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21814
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ptp_getcycles64() and ptp_clock_register() functions in drivers/ptp/ptp_clock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105664
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21852
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105651
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21853
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bpf_map_mmap() function in kernel/bpf/syscall.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106804
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21919
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the child_cfs_rq_on_list() function in kernel/sched/fair.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106601
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21929
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hid_ishtp_cl_remove() function in drivers/hid/intel-ish-hid/ishtp-hid-client.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106841
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21962
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106842
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21963
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106843
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21964
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the smb3_fs_context_parse_param() function in fs/smb/client/fs_context.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107728
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22018
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the MPOA_cache_impos_rcvd() function in net/atm/mpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107786
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22021
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nf_sk_lookup_slow_v6() function in net/ipv6/netfilter/nf_socket_ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107655
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22025
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nfs4_alloc_open_stateid() and nfsd_break_one_deleg() functions in fs/nfsd/nfs4state.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107717
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22027
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the streamzap_disconnect() function in drivers/media/rc/streamzap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107677
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22030
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the zswap_cpu_comp_dead() function in mm/zswap.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107720
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22033
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the do_compat_alignment_fixup() function in arch/arm64/kernel/compat_alignment.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107784
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22044
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the acpi_nfit_ctl() function in drivers/acpi/nfit/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107722
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22050
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the drivers/net/usb/usbnet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107782
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2025-22056
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nft_tunnel_obj_geneve_init() and nft_tunnel_opts_dump() functions in net/netfilter/nft_tunnel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU107671
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dst_count_dec() function in net/core/dst.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107656
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22058
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the udp_skb_has_head_state(), udp_rmem_release(), EXPORT_SYMBOL_GPL() and first_packet_length() functions in net/ipv4/udp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107727
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22062
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the proc_sctp_do_auth() and proc_sctp_do_udp_port() functions in net/sctp/sysctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107716
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22063
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the calipso_sock_getattr() and calipso_sock_setattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107788
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22064
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the nf_tables_updchain() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107715
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22065
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the idpf_shutdown() function in drivers/net/ethernet/intel/idpf/idpf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107713
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22070
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the v9fs_vfs_mkdir_dotl() function in fs/9p/vfs_inode_dotl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107746
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22075
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rtnl_vfinfo_size() function in net/core/rtnetlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107668
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22085
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ib_device_notify_register() function in drivers/infiniband/core/device.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107711
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22086
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ntohl() function in drivers/infiniband/hw/mlx5/cq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107667
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22088
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the erdma_cancel_mpatimer() function in drivers/infiniband/hw/erdma/erdma_cm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107763
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22091
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the create_mkey_callback(), alloc_cacheable_mr(), reg_create() and create_real_mr() functions in drivers/infiniband/hw/mlx5/mr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107708
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22093
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dmub_hw_lock_mgr_inbox0_cmd() function in drivers/gpu/drm/amd/display/dc/dce/dmub_hw_lock_mgr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107707
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22094
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vpa_pmu_del() function in arch/powerpc/perf/vpa-pmu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107666
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22097
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vkms_init() and vkms_destroy() functions in drivers/gpu/drm/vkms/vkms_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107744
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22102
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nxp_download_firmware() function in drivers/bluetooth/btnxpuart.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107705
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22103
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ipvlan_l3s_unregister() function in drivers/net/ipvlan/ipvlan_l3s.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107688
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22104
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vnic_add_client_data(), send_login(), handle_query_ip_offload_rsp() and handle_login_rsp() functions in drivers/net/ethernet/ibm/ibmvnic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107685
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22107
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sja1105_table_delete_entry() function in drivers/net/dsa/sja1105/sja1105_static_config.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107800
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22108
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bnxt_xmit_bd() function in drivers/net/ethernet/broadcom/bnxt/bnxt_xdp.c, within the bnxt_start_xmit() and dma_unmap_addr_set() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107653
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22109
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ax25_get_route() function in net/ax25/ax25_route.c, within the ax25_connect() function in net/ax25/af_ax25.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107792
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22112
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the bnxt_queue_start() and bnxt_queue_stop() functions in drivers/net/ethernet/broadcom/bnxt/bnxt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107756
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22116
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the idpf_stop() and idpf_init_task() functions in drivers/net/ethernet/intel/idpf/idpf_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107741
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22125
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the raid10_read_request() and raid10_write_one_disk() functions in drivers/md/raid10.c, within the raid1_read_request() and raid1_write_request() functions in drivers/md/raid1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107662
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22126
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __mddev_put(), md_seq_show(), EXPORT_SYMBOL_GPL(), md_notify_reboot(), md_autostart_arrays() and md_exit() functions in drivers/md/md.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107765
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22128
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ath12k_pci_probe() function in drivers/net/wireless/ath/ath12k/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107766
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23129
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the __free_irq() function in drivers/net/wireless/ath/ath11k/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107704
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23131
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the new_lockspace() function in fs/dlm/lockspace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107737
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23134
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snd_timer_user_copy_id(), snd_timer_user_ginfo() and snd_timer_user_gstatus() functions in sound/core/timer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107703
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23136
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the int3402_thermal_probe() function in drivers/thermal/intel/int340x_thermal/int3402_thermal.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107761
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23138
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the watch_queue_set_size() function in kernel/watch_queue.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108213
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23140
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the pci_endpoint_test_release_irq() function in drivers/misc/pci_endpoint_test.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108299
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23145
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108247
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23150
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the do_split() function in fs/ext4/namei.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108382
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23154
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the io_sendmsg_prep() function in io_uring/net.c, within the ~() function in io_uring/io_uring.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108214
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23160
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mtk_vcodec_fw_scp_init() function in drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108217
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37747
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the exclusive_event_installable(), _free_event(), perf_remove_from_owner(), list_del(), perf_pending_task(), __perf_event_overflow(), perf_event_alloc(), perf_event_exit_event() and perf_free_event() functions in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108296
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37748
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mtk_iommu_probe() function in drivers/iommu/mtk_iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108258
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37749
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ppp_sync_txmunge() function in drivers/net/ppp/ppp_synctty.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108240
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37750
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SMB2_negotiate() function in fs/smb/client/smb2pdu.c, within the decrypt_raw_data() function in fs/smb/client/smb2ops.c, within the cifs_crypto_secmech_release() function in fs/smb/client/cifsencrypt.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108295
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37755
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the wx_alloc_mapped_page() function in drivers/net/ethernet/wangxun/libwx/wx_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108388
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37773
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the virtio_fs_get_tree() function in fs/fuse/virtio_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108255
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37780
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the isofs_fh_to_parent() function in fs/isofs/export.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108389
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37787
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mv88e6xxx_teardown_devlink_regions_global() function in drivers/net/dsa/mv88e6xxx/devlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108394
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37789
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the validate_set() function in net/openvswitch/flow_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108395
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37790
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the mctp_sk_hash() function in net/mctp/af_mctp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37797
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hfsc_change_class() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108390
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37798
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qdisc_bstats_update() function in net/sched/sch_fq_codel.c, within the codel_qdisc_dequeue() function in net/sched/sch_codel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108401
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37799
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vmxnet3_process_xdp() function in drivers/net/vmxnet3/vmxnet3_xdp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108822
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37803
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the udmabuf_create() function in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108819
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37804
CWE-ID:
CWE-366 - Race Condition within a Thread
Exploit availability: No
DescriptionThe vulnerability allows a local user to corrupt data.
The vulnerability exists due to a data race within the io_wq_free_work() function in io_uring/io_uring.c. A local user can corrupt data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108799
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37809
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the typec_register_partner(), typec_unregister_partner(), typec_get_partner(), typec_partner_attach(), typec_partner_deattach() and typec_register_port() functions in drivers/usb/typec/class.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108789
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37820
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xennet_run_xdp() function in drivers/net/xen-netfront.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108825
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37823
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hfsc_dequeue() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108803
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37824
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tipc_mon_reinit_self() function in net/tipc/monitor.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108805
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37829
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scpi_cpufreq_get_rate() function in drivers/cpufreq/scpi-cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108806
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37830
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the scmi_cpufreq_get_rate() function in drivers/cpufreq/scmi-cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108807
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37831
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the apple_soc_cpufreq_get_rate() function in drivers/cpufreq/apple-soc-cpufreq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108821
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37833
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the niu_try_msix() function in drivers/net/ethernet/sun/niu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108892
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37842
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the fsl_qspi_cleanup(), fsl_qspi_probe(), fsl_qspi_remove() and module_platform_driver() functions in drivers/spi/spi-fsl-qspi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108902
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37870
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dcn401_enable_stream() function in drivers/gpu/drm/amd/display/dc/hwss/dcn401/dcn401_hwseq.c, within the dcn20_enable_stream() function in drivers/gpu/drm/amd/display/dc/hwss/dcn20/dcn20_hwseq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108897
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37879
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the p9_client_read_once(), p9_client_write(), EXPORT_SYMBOL_GPL() and p9_client_readdir() functions in net/9p/client.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108890
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37886
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the pdsc_q_map() function in drivers/net/ethernet/amd/pds_core/core.c, within the pdsc_process_notifyq(), pdsc_process_adminq(), pdsc_adminq_isr(), __pdsc_adminq_post() and pdsc_adminq_post() functions in drivers/net/ethernet/amd/pds_core/adminq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108891
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37887
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the pdsc_dl_info_get() function in drivers/net/ethernet/amd/pds_core/devlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109533
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37949
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the xs_suspend_exit(), xs_send(), xs_wait_for_reply(), xenbus_dev_request_and_reply() and xs_talkv() functions in drivers/xen/xenbus/xenbus_xs.c, within the xenbus_dev_queue_reply() function in drivers/xen/xenbus/xenbus_dev_frontend.c, within the process_msg() and process_writes() functions in drivers/xen/xenbus/xenbus_comms.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109511
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37957
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the shutdown_interception() function in arch/x86/kvm/svm/svm.c, within the kvm_smm_changed() function in arch/x86/kvm/smm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109532
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37958
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __split_huge_pmd_locked() and split_huge_pmd_locked() functions in mm/huge_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109562
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37960
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the memblock_double_array() function in mm/memblock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109586
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37974
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __clp_add() function in arch/s390/pci/pci_clp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107697
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38152
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rproc_shutdown() function in drivers/remoteproc/remoteproc_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107732
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38637
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the skbprio_enqueue() and skbprio_dequeue() functions in net/sched/sch_skbprio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU107771
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40325
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the raid10_handle_discard() function in drivers/md/raid10.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Real Time Module: 15-SP7
SUSE Linux Enterprise Live Patching: 15-SP7
SUSE Linux Enterprise Real Time 15: SP7
SUSE Linux Enterprise Server for SAP Applications 15: SP7
SUSE Linux Enterprise Server 15: SP7
kernel-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug: before 6.4.0-150700.7.3.1
kernel-devel-rt: before 6.4.0-150700.7.3.1
kernel-source-rt: before 6.4.0-150700.7.3.1
gfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel-debuginfo: before 6.4.0-150700.7.3.1
dlm-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt_debug-debugsource: before 6.4.0-150700.7.3.1
dlm-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel: before 6.4.0-150700.7.3.1
kernel-rt_debug-devel-debuginfo: before 6.4.0-150700.7.3.1
gfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-syms-rt: before 6.4.0-150700.7.3.1
kernel-rt-devel: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt_debug-debuginfo: before 6.4.0-150700.7.3.1
cluster-md-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-rt-debugsource: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt-debuginfo: before 6.4.0-150700.7.3.1
ocfs2-kmp-rt: before 6.4.0-150700.7.3.1
kernel-rt-debuginfo: before 6.4.0-150700.7.3.1
kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo: before 1-150700.1.3.1
kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource: before 1-150700.1.3.1
kernel-livepatch-6_4_0-150700_7_3-rt: before 1-150700.1.3.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.