| Risk | Low |
| Patch available | YES |
| Number of vulnerabilities | 17 |
| CVE-ID | CVE-2022-49138 CVE-2022-49770 CVE-2023-52923 CVE-2023-52927 CVE-2024-26643 CVE-2024-53057 CVE-2024-53164 CVE-2024-57947 CVE-2025-37797 CVE-2025-38079 CVE-2025-38181 CVE-2025-38200 CVE-2025-38206 CVE-2025-38212 CVE-2025-38213 CVE-2025-38257 CVE-2025-38289 |
| CWE-ID | CWE-119 CWE-416 CWE-667 CWE-20 CWE-362 CWE-399 CWE-401 CWE-388 CWE-191 CWE-415 CWE-125 |
| Exploitation vector | Local |
| Public exploit | Public exploit code for vulnerability #4 is available. |
| Vulnerable software |
SUSE Linux Enterprise High Performance Computing LTSS 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing ESPOS 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system kernel-64kb-extra-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-64kb-debuginfo Operating systems & Components / Operating system package or component dtb-socionext Operating systems & Components / Operating system package or component dtb-arm Operating systems & Components / Operating system package or component ocfs2-kmp-64kb-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-64kb-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-64kb-debuginfo Operating systems & Components / Operating system package or component dtb-nvidia Operating systems & Components / Operating system package or component dtb-amd Operating systems & Components / Operating system package or component gfs2-kmp-64kb Operating systems & Components / Operating system package or component kernel-64kb-optional-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-64kb Operating systems & Components / Operating system package or component dtb-exynos Operating systems & Components / Operating system package or component dtb-allwinner Operating systems & Components / Operating system package or component dtb-cavium Operating systems & Components / Operating system package or component kernel-64kb-optional Operating systems & Components / Operating system package or component dtb-sprd Operating systems & Components / Operating system package or component dtb-mediatek Operating systems & Components / Operating system package or component dtb-apm Operating systems & Components / Operating system package or component dtb-marvell Operating systems & Components / Operating system package or component reiserfs-kmp-64kb Operating systems & Components / Operating system package or component dtb-hisilicon Operating systems & Components / Operating system package or component dtb-freescale Operating systems & Components / Operating system package or component dtb-rockchip Operating systems & Components / Operating system package or component ocfs2-kmp-64kb Operating systems & Components / Operating system package or component dtb-xilinx Operating systems & Components / Operating system package or component cluster-md-kmp-64kb Operating systems & Components / Operating system package or component dtb-lg Operating systems & Components / Operating system package or component dlm-kmp-64kb Operating systems & Components / Operating system package or component dtb-apple Operating systems & Components / Operating system package or component dtb-qcom Operating systems & Components / Operating system package or component gfs2-kmp-64kb-debuginfo Operating systems & Components / Operating system package or component dtb-altera Operating systems & Components / Operating system package or component kernel-64kb-extra Operating systems & Components / Operating system package or component dtb-amazon Operating systems & Components / Operating system package or component dtb-renesas Operating systems & Components / Operating system package or component dtb-amlogic Operating systems & Components / Operating system package or component reiserfs-kmp-64kb-debuginfo Operating systems & Components / Operating system package or component dtb-broadcom Operating systems & Components / Operating system package or component dtb-aarch64 Operating systems & Components / Operating system package or component kernel-kvmsmall Operating systems & Components / Operating system package or component kernel-default-vdso Operating systems & Components / Operating system package or component kernel-default-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-kvmsmall-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-kvmsmall-vdso Operating systems & Components / Operating system package or component kernel-default-extra Operating systems & Components / Operating system package or component kselftests-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-optional-debuginfo Operating systems & Components / Operating system package or component kernel-default-extra-debuginfo Operating systems & Components / Operating system package or component kernel-obs-qa Operating systems & Components / Operating system package or component kselftests-kmp-default Operating systems & Components / Operating system package or component kernel-default-optional Operating systems & Components / Operating system package or component kernel-kvmsmall-debugsource Operating systems & Components / Operating system package or component kernel-default-base-rebuild Operating systems & Components / Operating system package or component kernel-kvmsmall-debuginfo Operating systems & Components / Operating system package or component kernel-kvmsmall-devel-debuginfo Operating systems & Components / Operating system package or component kernel-kvmsmall-devel Operating systems & Components / Operating system package or component kernel-docs-html Operating systems & Components / Operating system package or component kernel-source-vanilla Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP5_Update_29-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_116-default Operating systems & Components / Operating system package or component kernel-default-livepatch-devel Operating systems & Components / Operating system package or component kernel-default-livepatch Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_116-default-debuginfo Operating systems & Components / Operating system package or component kernel-zfcpdump-debuginfo Operating systems & Components / Operating system package or component kernel-zfcpdump-debugsource Operating systems & Components / Operating system package or component kernel-zfcpdump Operating systems & Components / Operating system package or component reiserfs-kmp-default Operating systems & Components / Operating system package or component reiserfs-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-docs Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component kernel-64kb-debugsource Operating systems & Components / Operating system package or component kernel-64kb-devel Operating systems & Components / Operating system package or component kernel-64kb-debuginfo Operating systems & Components / Operating system package or component kernel-64kb-devel-debuginfo Operating systems & Components / Operating system package or component kernel-64kb Operating systems & Components / Operating system package or component kernel-obs-build-debugsource Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component kernel-obs-build Operating systems & Components / Operating system package or component gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 17 vulnerabilities.
EUVDB-ID: #VU104804
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49138
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the hci_conn_complete_evt(), hci_sync_conn_complete_evt() and le_conn_complete_evt() functions in net/bluetooth/hci_event.c, within the hci_conn_add() function in net/bluetooth/hci_conn.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108233
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49770
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ceph_update_snap_trace() function in fs/ceph/snap.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52923
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nft_rbtree_cmp(), __nft_rbtree_lookup(), nft_rbtree_get(), nft_rbtree_gc_elem(), nft_rbtree_activate(), nft_rbtree_flush() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_drop(), pipapo_gc() and nft_pipapo_activate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_cmp(), nft_rhash_activate(), nft_rhash_flush(), nft_rhash_deactivate(), nft_rhash_gc() and nft_rhash_destroy() functions in net/netfilter/nft_set_hash.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105746
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-52927
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nft_ct_set_zone_eval() and nft_ct_tmpl_alloc_pcpu() functions in net/netfilter/nft_ct.c, within the EXPORT_SYMBOL_GPL() and nf_ct_find_expectation() functions in net/netfilter/nf_conntrack_expect.c, within the init_conntrack() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU88135
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26643
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the nf_tables_unbind_set() function in net/netfilter/nf_tables_api.c. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100707
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53164
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_pipapo_avx2_lookup_slow() function in net/netfilter/nft_set_pipapo_avx2.c, within the nft_pipapo_lookup() and pipapo_get() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37797
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hfsc_change_class() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111459
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38079
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hash_accept() function in crypto/algif_hash.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112316
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38181
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the calipso_req_setattr() and calipso_req_delattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112322
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38200
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the i40e_pf_reset() function in drivers/net/ethernet/intel/i40e/i40e_common.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112315
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38206
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the exfat_free_upcase_table() function in fs/exfat/nls.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112286
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38212
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the shm_try_destroy_orphaned() function in ipc/shm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112292
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38213
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vgacon_scroll() function in drivers/video/console/vgacon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112823
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38257
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the _copy_apqns_from_user() function in drivers/s390/crypto/pkey_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112747
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38289
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise High Performance Computing LTSS 15: SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP5
SUSE Linux Enterprise Server 15 SP5: LTSS
SUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
openSUSE Leap: 15.5
kernel-64kb-extra-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-socionext: before 5.14.21-150500.55.116.1
dtb-arm: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-nvidia: before 5.14.21-150500.55.116.1
dtb-amd: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb: before 5.14.21-150500.55.116.1
kernel-64kb-optional-debuginfo: before 5.14.21-150500.55.116.1
kselftests-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-exynos: before 5.14.21-150500.55.116.1
dtb-allwinner: before 5.14.21-150500.55.116.1
dtb-cavium: before 5.14.21-150500.55.116.1
kernel-64kb-optional: before 5.14.21-150500.55.116.1
dtb-sprd: before 5.14.21-150500.55.116.1
dtb-mediatek: before 5.14.21-150500.55.116.1
dtb-apm: before 5.14.21-150500.55.116.1
dtb-marvell: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-hisilicon: before 5.14.21-150500.55.116.1
dtb-freescale: before 5.14.21-150500.55.116.1
dtb-rockchip: before 5.14.21-150500.55.116.1
ocfs2-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-xilinx: before 5.14.21-150500.55.116.1
cluster-md-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-lg: before 5.14.21-150500.55.116.1
dlm-kmp-64kb: before 5.14.21-150500.55.116.1
dtb-apple: before 5.14.21-150500.55.116.1
dtb-qcom: before 5.14.21-150500.55.116.1
gfs2-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-altera: before 5.14.21-150500.55.116.1
kernel-64kb-extra: before 5.14.21-150500.55.116.1
dtb-amazon: before 5.14.21-150500.55.116.1
dtb-renesas: before 5.14.21-150500.55.116.1
dtb-amlogic: before 5.14.21-150500.55.116.1
reiserfs-kmp-64kb-debuginfo: before 5.14.21-150500.55.116.1
dtb-broadcom: before 5.14.21-150500.55.116.1
dtb-aarch64: before 5.14.21-150500.55.116.1
kernel-kvmsmall: before 5.14.21-150500.55.116.1
kernel-default-vdso: before 5.14.21-150500.55.116.1
kernel-default-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-vdso: before 5.14.21-150500.55.116.1
kernel-default-extra: before 5.14.21-150500.55.116.1
kselftests-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-optional-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-extra-debuginfo: before 5.14.21-150500.55.116.1
kernel-obs-qa: before 5.14.21-150500.55.116.1
kselftests-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-optional: before 5.14.21-150500.55.116.1
kernel-kvmsmall-debugsource: before 5.14.21-150500.55.116.1
kernel-default-base-rebuild: before 5.14.21-150500.55.116.1.150500.6.55.1
kernel-kvmsmall-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-kvmsmall-devel: before 5.14.21-150500.55.116.1
kernel-docs-html: before 5.14.21-150500.55.116.1
kernel-source-vanilla: before 5.14.21-150500.55.116.1
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-zfcpdump-debuginfo: before 5.14.21-150500.55.116.1
kernel-zfcpdump-debugsource: before 5.14.21-150500.55.116.1
kernel-zfcpdump: before 5.14.21-150500.55.116.1
reiserfs-kmp-default: before 5.14.21-150500.55.116.1
reiserfs-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-docs: before 5.14.21-150500.55.116.1
kernel-source: before 5.14.21-150500.55.116.1
kernel-macros: before 5.14.21-150500.55.116.1
kernel-devel: before 5.14.21-150500.55.116.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-64kb-debugsource: before 5.14.21-150500.55.116.1
kernel-64kb-devel: before 5.14.21-150500.55.116.1
kernel-64kb-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb-devel-debuginfo: before 5.14.21-150500.55.116.1
kernel-64kb: before 5.14.21-150500.55.116.1
kernel-obs-build-debugsource: before 5.14.21-150500.55.116.1
cluster-md-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
cluster-md-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel-debuginfo: before 5.14.21-150500.55.116.1
ocfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-base: before 5.14.21-150500.55.116.1.150500.6.55.1
dlm-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-syms: before 5.14.21-150500.55.116.1
gfs2-kmp-default: before 5.14.21-150500.55.116.1
ocfs2-kmp-default: before 5.14.21-150500.55.116.1
kernel-obs-build: before 5.14.21-150500.55.116.1
gfs2-kmp-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
dlm-kmp-default: before 5.14.21-150500.55.116.1
kernel-default-devel: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.