SUSE update for the Linux Kernel



Risk High
Patch available YES
Number of vulnerabilities 22
CVE-ID CVE-2022-49980
CVE-2022-50116
CVE-2023-53117
CVE-2024-42265
CVE-2024-53093
CVE-2024-53177
CVE-2024-58239
CVE-2025-38180
CVE-2025-38184
CVE-2025-38323
CVE-2025-38352
CVE-2025-38460
CVE-2025-38498
CVE-2025-38499
CVE-2025-38546
CVE-2025-38555
CVE-2025-38560
CVE-2025-38563
CVE-2025-38608
CVE-2025-38617
CVE-2025-38618
CVE-2025-38644
CWE-ID CWE-416
CWE-667
CWE-125
CWE-20
CWE-835
CWE-476
CWE-362
CWE-269
CWE-401
CWE-908
Exploitation vector Local
Public exploit Vulnerability #11 is being exploited in the wild.
Vulnerable software
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

kernel-rt_debug
Operating systems & Components / Operating system package or component

kernel-rt
Operating systems & Components / Operating system package or component

gfs2-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-livepatch-devel
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-extra
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt_debug-debuginfo
Operating systems & Components / Operating system package or component

kselftests-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-optional
Operating systems & Components / Operating system package or component

reiserfs-kmp-rt
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-debuginfo
Operating systems & Components / Operating system package or component

cluster-md-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt-vdso
Operating systems & Components / Operating system package or component

kernel-rt-extra-debuginfo
Operating systems & Components / Operating system package or component

dlm-kmp-rt
Operating systems & Components / Operating system package or component

kernel-rt_debug-devel
Operating systems & Components / Operating system package or component

kernel-rt-devel
Operating systems & Components / Operating system package or component

kernel-rt_debug-debugsource
Operating systems & Components / Operating system package or component

kernel-rt_debug-vdso
Operating systems & Components / Operating system package or component

kselftests-kmp-rt
Operating systems & Components / Operating system package or component

ocfs2-kmp-rt
Operating systems & Components / Operating system package or component

gfs2-kmp-rt-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-vdso-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-livepatch
Operating systems & Components / Operating system package or component

kernel-rt-optional-debuginfo
Operating systems & Components / Operating system package or component

kernel-rt-devel-debuginfo
Operating systems & Components / Operating system package or component

kernel-devel-rt
Operating systems & Components / Operating system package or component

kernel-source-rt
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 22 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU111528

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49980

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb_udc_uevent() function in drivers/usb/gadget/udc/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU111576

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50116

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the gsm_queue(), gsmld_output(), gsm_stuff_frame(), gsm_data_alloc(), gsm_is_flow_ctrl_msg(), __gsm_data_queue(), gsm_dlci_modem_output(), gsm_control_message(), gsm_control_wait(), gsm_dlci_close(), gsm_dlci_open(), gsm1_receive(), gsm_cleanup_mux(), gsm_activate_mux(), gsm_alloc_mux() and gsmld_open() functions in drivers/tty/n_gsm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds read

EUVDB-ID: #VU108443

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53117

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the __close_fd() function in fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU96203

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-42265

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __releases() function in fs/file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper locking

EUVDB-ID: #VU100834

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53093

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the nvme_add_ns_head_cdev(), nvme_mpath_alloc_disk(), nvme_mpath_set_live(), nvme_mpath_shutdown_disk() and nvme_mpath_remove_disk() functions in drivers/nvme/host/multipath.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU102056

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53177

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the SMB2_query_info_free(), invalidate_all_cached_dirs(), smb2_cached_lease_break(), cached_dir_lease_break() and cfids_laundromat_worker() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Infinite loop

EUVDB-ID: #VU114545

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-58239

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the tls_sw_recvmsg() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Use-after-free

EUVDB-ID: #VU112282

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38180

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lec_itf_walk(), lec_seq_start() and lec_seq_stop() functions in net/atm/lec.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) NULL pointer dereference

EUVDB-ID: #VU112311

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38184

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tipc_udp_nl_dump_remoteip() function in net/tipc/udp_media.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU112743

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38323

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the DEFINE_MUTEX(), lec_vcc_attach(), lecd_attach() and lane_ioctl() functions in net/atm/lec.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Race condition

EUVDB-ID: #VU113313

Risk: High

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2025-38352

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the run_posix_cpu_timers() function in kernel/time/posix-cpu-timers.c. A local user can escalate privileges on the system.

Note, the vulnerability is being actively exploited in the wild against Android devices.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

12) NULL pointer dereference

EUVDB-ID: #VU113260

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38460

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the DEFINE_MUTEX(), to_atmarpd(), atmarpd_close() and atm_init_atmarp() functions in net/atm/clip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper privilege management

EUVDB-ID: #VU113806

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38498

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a local user to read and manipulate data.

The vulnerability exists due to improperly imposed permissions within the do_change_type() function in fs/namespace.c. A local user can read and manipulate data.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Input validation error

EUVDB-ID: #VU113807

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38499

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the clone_private_mount() function in fs/namespace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Memory leak

EUVDB-ID: #VU114130

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38546

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the atm_init_atmarp() and clip_ioctl() functions in net/atm/clip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Use-after-free

EUVDB-ID: #VU114242

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38555

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the composite_os_desc_req_prepare() function in drivers/usb/gadget/composite.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Input validation error

EUVDB-ID: #VU114279

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38560

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the early_set_pages_state() function in arch/x86/kernel/sev.c, within the setup_cpuid_table() and pvalidate_pages() functions in arch/x86/kernel/sev-shared.c, within the get_cpuflags() function in arch/x86/boot/cpuflags.c, within the __page_state_change() function in arch/x86/boot/compressed/sev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory leak

EUVDB-ID: #VU114234

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38563

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the perf_mmap_pfn_mkwrite() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Use of uninitialized resource

EUVDB-ID: #VU114282

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38608

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the sk_psock_msg_verdict() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Improper locking

EUVDB-ID: #VU114533

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38617

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the packet_set_ring() function in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Use-after-free

EUVDB-ID: #VU114500

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38618

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __vsock_bind_connectible() function in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Use of uninitialized resource

EUVDB-ID: #VU114540

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38644

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the ieee80211_tdls_oper() function in net/mac80211/tdls.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

openSUSE Leap: 15.5

kernel-rt_debug: before 5.14.21-150500.13.106.1

kernel-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-extra: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1

kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-optional: before 5.14.21-150500.13.106.1

reiserfs-kmp-rt: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-debuginfo: before 5.14.21-150500.13.106.1

cluster-md-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt-vdso: before 5.14.21-150500.13.106.1

kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1

dlm-kmp-rt: before 5.14.21-150500.13.106.1

kernel-rt_debug-devel: before 5.14.21-150500.13.106.1

kernel-rt-devel: before 5.14.21-150500.13.106.1

kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1

kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1

kselftests-kmp-rt: before 5.14.21-150500.13.106.1

ocfs2-kmp-rt: before 5.14.21-150500.13.106.1

gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-livepatch: before 5.14.21-150500.13.106.1

kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1

kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1

kernel-devel-rt: before 5.14.21-150500.13.106.1

kernel-source-rt: before 5.14.21-150500.13.106.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###