SUSE update for the Linux Kernel



Risk Low
Patch available YES
Number of vulnerabilities 29
CVE-ID CVE-2022-49138
CVE-2022-49770
CVE-2023-52923
CVE-2023-52927
CVE-2024-26643
CVE-2024-53057
CVE-2024-53164
CVE-2024-57947
CVE-2025-21701
CVE-2025-21971
CVE-2025-37797
CVE-2025-37798
CVE-2025-38079
CVE-2025-38088
CVE-2025-38120
CVE-2025-38177
CVE-2025-38181
CVE-2025-38200
CVE-2025-38206
CVE-2025-38212
CVE-2025-38213
CVE-2025-38257
CVE-2025-38289
CVE-2025-38350
CVE-2025-38468
CVE-2025-38477
CVE-2025-38494
CVE-2025-38495
CVE-2025-38497
CWE-ID CWE-119
CWE-416
CWE-667
CWE-20
CWE-362
CWE-399
CWE-401
CWE-682
CWE-125
CWE-388
CWE-191
CWE-415
CWE-476
Exploitation vector Local
Public exploit Public exploit code for vulnerability #4 is available.
Vulnerable software
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 29 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU104804

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49138

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the hci_conn_complete_evt(), hci_sync_conn_complete_evt() and le_conn_complete_evt() functions in net/bluetooth/hci_event.c, within the hci_conn_add() function in net/bluetooth/hci_conn.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU108233

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49770

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ceph_update_snap_trace() function in fs/ceph/snap.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper locking

EUVDB-ID: #VU103086

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52923

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nft_rbtree_cmp(), __nft_rbtree_lookup(), nft_rbtree_get(), nft_rbtree_gc_elem(), nft_rbtree_activate(), nft_rbtree_flush() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_drop(), pipapo_gc() and nft_pipapo_activate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_cmp(), nft_rhash_activate(), nft_rhash_flush(), nft_rhash_deactivate(), nft_rhash_gc() and nft_rhash_destroy() functions in net/netfilter/nft_set_hash.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU105746

Risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2023-52927

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nft_ct_set_zone_eval() and nft_ct_tmpl_alloc_pcpu() functions in net/netfilter/nft_ct.c, within the EXPORT_SYMBOL_GPL() and nf_ct_find_expectation() functions in net/netfilter/nf_conntrack_expect.c, within the init_conntrack() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

5) Race condition

EUVDB-ID: #VU88135

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26643

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the nf_tables_unbind_set() function in net/netfilter/nf_tables_api.c. A local user can exploit the race and escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU100707

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU102248

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53164

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Memory leak

EUVDB-ID: #VU103269

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57947

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_pipapo_avx2_lookup_slow() function in net/netfilter/nft_set_pipapo_avx2.c, within the nft_pipapo_lookup() and pipapo_get() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper locking

EUVDB-ID: #VU103960

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21701

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ethnl_ops_begin() function in net/ethtool/netlink.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Incorrect calculation

EUVDB-ID: #VU106863

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21971

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the tc_ctl_tclass() function in net/sched/sch_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Input validation error

EUVDB-ID: #VU108391

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37797

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hfsc_change_class() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Input validation error

EUVDB-ID: #VU108390

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37798

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qdisc_bstats_update() function in net/sched/sch_fq_codel.c, within the codel_qdisc_dequeue() function in net/sched/sch_codel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Use-after-free

EUVDB-ID: #VU111459

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38079

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hash_accept() function in crypto/algif_hash.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Out-of-bounds read

EUVDB-ID: #VU112116

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38088

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the memtrace_read() function in arch/powerpc/platforms/powernv/memtrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Memory leak

EUVDB-ID: #VU112173

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38120

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_pipapo_avx2_estimate() and nft_pipapo_avx2_lookup() functions in net/netfilter/nft_set_pipapo_avx2.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Input validation error

EUVDB-ID: #VU112334

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38177

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the eltree_insert() and hfsc_qlen_notify() functions in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Improper error handling

EUVDB-ID: #VU112316

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38181

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the calipso_req_setattr() and calipso_req_delattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Integer underflow

EUVDB-ID: #VU112322

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38200

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the i40e_pf_reset() function in drivers/net/ethernet/intel/i40e/i40e_common.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Double free

EUVDB-ID: #VU112315

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38206

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the exfat_free_upcase_table() function in fs/exfat/nls.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Use-after-free

EUVDB-ID: #VU112286

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38212

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the shm_try_destroy_orphaned() function in ipc/shm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Out-of-bounds read

EUVDB-ID: #VU112292

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38213

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the vgacon_scroll() function in drivers/video/console/vgacon.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Buffer overflow

EUVDB-ID: #VU112823

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38257

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the _copy_apqns_from_user() function in drivers/s390/crypto/pkey_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Use-after-free

EUVDB-ID: #VU112747

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38289

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU113101

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38350

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_alloc_handle() and qdisc_tree_reduce_backlog() functions in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) NULL pointer dereference

EUVDB-ID: #VU113389

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38468

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the htb_lookup_leaf() function in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Use-after-free

EUVDB-ID: #VU113376

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38477

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qfq_change_class(), qfq_delete_class(), qfq_dump_class() and qfq_dump_class_stats() functions in net/sched/sch_qfq.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Buffer overflow

EUVDB-ID: #VU113407

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38494

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the __hid_request() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Incorrect calculation

EUVDB-ID: #VU113410

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38495

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the hid_alloc_report_buf() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Out-of-bounds read

EUVDB-ID: #VU113387

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38497

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the webusb_landingPage_store() and os_desc_qw_sign_store() functions in drivers/usb/gadget/configfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.103.2

kernel-rt: before 5.14.21-150500.13.103.2

kernel-rt-debugsource: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel: before 5.14.21-150500.13.103.2

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch-devel: before 5.14.21-150500.13.103.2

gfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt-extra: before 5.14.21-150500.13.103.2

kernel-rt-debuginfo: before 5.14.21-150500.13.103.2

dlm-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt: before 5.14.21-150500.13.103.2

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso: before 5.14.21-150500.13.103.2

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-optional: before 5.14.21-150500.13.103.2

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt_debug-debugsource: before 5.14.21-150500.13.103.2

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-devel: before 5.14.21-150500.13.103.2

kselftests-kmp-rt: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt: before 5.14.21-150500.13.103.2

ocfs2-kmp-rt: before 5.14.21-150500.13.103.2

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.103.2

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.103.2

kernel-rt-livepatch: before 5.14.21-150500.13.103.2

kernel-devel-rt: before 5.14.21-150500.13.103.2

kernel-source-rt: before 5.14.21-150500.13.103.2

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###