| Risk | Low |
| Patch available | YES |
| Number of vulnerabilities | 29 |
| CVE-ID | CVE-2022-49138 CVE-2022-49770 CVE-2023-52923 CVE-2023-52927 CVE-2024-26643 CVE-2024-53057 CVE-2024-53164 CVE-2024-57947 CVE-2025-21701 CVE-2025-21971 CVE-2025-37797 CVE-2025-37798 CVE-2025-38079 CVE-2025-38088 CVE-2025-38120 CVE-2025-38177 CVE-2025-38181 CVE-2025-38200 CVE-2025-38206 CVE-2025-38212 CVE-2025-38213 CVE-2025-38257 CVE-2025-38289 CVE-2025-38350 CVE-2025-38468 CVE-2025-38477 CVE-2025-38494 CVE-2025-38495 CVE-2025-38497 |
| CWE-ID | CWE-119 CWE-416 CWE-667 CWE-20 CWE-362 CWE-399 CWE-401 CWE-682 CWE-125 CWE-388 CWE-191 CWE-415 CWE-476 |
| Exploitation vector | Local |
| Public exploit | Public exploit code for vulnerability #4 is available. |
| Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system kernel-rt_debug Operating systems & Components / Operating system package or component kernel-rt Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 29 vulnerabilities.
EUVDB-ID: #VU104804
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49138
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the hci_conn_complete_evt(), hci_sync_conn_complete_evt() and le_conn_complete_evt() functions in net/bluetooth/hci_event.c, within the hci_conn_add() function in net/bluetooth/hci_conn.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108233
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49770
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ceph_update_snap_trace() function in fs/ceph/snap.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52923
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nft_rbtree_cmp(), __nft_rbtree_lookup(), nft_rbtree_get(), nft_rbtree_gc_elem(), nft_rbtree_activate(), nft_rbtree_flush() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_drop(), pipapo_gc() and nft_pipapo_activate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_cmp(), nft_rhash_activate(), nft_rhash_flush(), nft_rhash_deactivate(), nft_rhash_gc() and nft_rhash_destroy() functions in net/netfilter/nft_set_hash.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105746
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-52927
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nft_ct_set_zone_eval() and nft_ct_tmpl_alloc_pcpu() functions in net/netfilter/nft_ct.c, within the EXPORT_SYMBOL_GPL() and nf_ct_find_expectation() functions in net/netfilter/nf_conntrack_expect.c, within the init_conntrack() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU88135
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26643
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the nf_tables_unbind_set() function in net/netfilter/nf_tables_api.c. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100707
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53164
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_pipapo_avx2_lookup_slow() function in net/netfilter/nft_set_pipapo_avx2.c, within the nft_pipapo_lookup() and pipapo_get() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103960
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21701
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU106863
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21971
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the tc_ctl_tclass() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37797
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hfsc_change_class() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108390
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37798
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qdisc_bstats_update() function in net/sched/sch_fq_codel.c, within the codel_qdisc_dequeue() function in net/sched/sch_codel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111459
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38079
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hash_accept() function in crypto/algif_hash.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112116
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38088
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the memtrace_read() function in arch/powerpc/platforms/powernv/memtrace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112173
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38120
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_pipapo_avx2_estimate() and nft_pipapo_avx2_lookup() functions in net/netfilter/nft_set_pipapo_avx2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112334
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38177
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the eltree_insert() and hfsc_qlen_notify() functions in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112316
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38181
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the calipso_req_setattr() and calipso_req_delattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112322
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38200
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the i40e_pf_reset() function in drivers/net/ethernet/intel/i40e/i40e_common.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112315
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38206
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the exfat_free_upcase_table() function in fs/exfat/nls.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112286
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38212
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the shm_try_destroy_orphaned() function in ipc/shm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112292
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38213
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vgacon_scroll() function in drivers/video/console/vgacon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112823
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38257
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the _copy_apqns_from_user() function in drivers/s390/crypto/pkey_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112747
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38289
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113101
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38350
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_alloc_handle() and qdisc_tree_reduce_backlog() functions in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113389
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38468
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the htb_lookup_leaf() function in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113376
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38477
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qfq_change_class(), qfq_delete_class(), qfq_dump_class() and qfq_dump_class_stats() functions in net/sched/sch_qfq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113407
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38494
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the __hid_request() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113410
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38495
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the hid_alloc_report_buf() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113387
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38497
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the webusb_landingPage_store() and os_desc_qw_sign_store() functions in drivers/usb/gadget/configfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.103.2
kernel-rt: before 5.14.21-150500.13.103.2
kernel-rt-debugsource: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel: before 5.14.21-150500.13.103.2
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2
gfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt-extra: before 5.14.21-150500.13.103.2
kernel-rt-debuginfo: before 5.14.21-150500.13.103.2
dlm-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt: before 5.14.21-150500.13.103.2
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso: before 5.14.21-150500.13.103.2
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-optional: before 5.14.21-150500.13.103.2
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-devel: before 5.14.21-150500.13.103.2
kselftests-kmp-rt: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt: before 5.14.21-150500.13.103.2
ocfs2-kmp-rt: before 5.14.21-150500.13.103.2
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2
kernel-rt-livepatch: before 5.14.21-150500.13.103.2
kernel-devel-rt: before 5.14.21-150500.13.103.2
kernel-source-rt: before 5.14.21-150500.13.103.2
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.