| Risk | High |
| Patch available | YES |
| Number of vulnerabilities | 22 |
| CVE-ID | CVE-2022-49980 CVE-2022-50116 CVE-2023-53117 CVE-2024-42265 CVE-2024-53093 CVE-2024-53177 CVE-2024-58239 CVE-2025-38180 CVE-2025-38184 CVE-2025-38323 CVE-2025-38352 CVE-2025-38460 CVE-2025-38498 CVE-2025-38499 CVE-2025-38546 CVE-2025-38555 CVE-2025-38560 CVE-2025-38563 CVE-2025-38608 CVE-2025-38617 CVE-2025-38618 CVE-2025-38644 |
| CWE-ID | CWE-416 CWE-667 CWE-125 CWE-20 CWE-835 CWE-476 CWE-362 CWE-269 CWE-401 CWE-908 |
| Exploitation vector | Local |
| Public exploit | Vulnerability #11 is being exploited in the wild. |
| Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system kernel-rt_debug Operating systems & Components / Operating system package or component kernel-rt Operating systems & Components / Operating system package or component gfs2-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-livepatch-devel Operating systems & Components / Operating system package or component ocfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-extra Operating systems & Components / Operating system package or component reiserfs-kmp-rt-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-devel-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt_debug-debuginfo Operating systems & Components / Operating system package or component kselftests-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-optional Operating systems & Components / Operating system package or component reiserfs-kmp-rt Operating systems & Components / Operating system package or component cluster-md-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-rt Operating systems & Components / Operating system package or component kernel-rt-vdso Operating systems & Components / Operating system package or component kernel-rt-extra-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-rt Operating systems & Components / Operating system package or component kernel-rt_debug-devel Operating systems & Components / Operating system package or component kernel-rt-devel Operating systems & Components / Operating system package or component kernel-rt_debug-debugsource Operating systems & Components / Operating system package or component kernel-rt_debug-vdso Operating systems & Components / Operating system package or component kselftests-kmp-rt Operating systems & Components / Operating system package or component ocfs2-kmp-rt Operating systems & Components / Operating system package or component gfs2-kmp-rt-debuginfo Operating systems & Components / Operating system package or component kernel-rt-vdso-debuginfo Operating systems & Components / Operating system package or component kernel-rt-livepatch Operating systems & Components / Operating system package or component kernel-rt-optional-debuginfo Operating systems & Components / Operating system package or component kernel-rt-devel-debuginfo Operating systems & Components / Operating system package or component kernel-devel-rt Operating systems & Components / Operating system package or component kernel-source-rt Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 22 vulnerabilities.
EUVDB-ID: #VU111528
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49980
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb_udc_uevent() function in drivers/usb/gadget/udc/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111576
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50116
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the gsm_queue(), gsmld_output(), gsm_stuff_frame(), gsm_data_alloc(), gsm_is_flow_ctrl_msg(), __gsm_data_queue(), gsm_dlci_modem_output(), gsm_control_message(), gsm_control_wait(), gsm_dlci_close(), gsm_dlci_open(), gsm1_receive(), gsm_cleanup_mux(), gsm_activate_mux(), gsm_alloc_mux() and gsmld_open() functions in drivers/tty/n_gsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108443
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53117
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the __close_fd() function in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU96203
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-42265
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __releases() function in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100834
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53093
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nvme_add_ns_head_cdev(), nvme_mpath_alloc_disk(), nvme_mpath_set_live(), nvme_mpath_shutdown_disk() and nvme_mpath_remove_disk() functions in drivers/nvme/host/multipath.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102056
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53177
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the SMB2_query_info_free(), invalidate_all_cached_dirs(), smb2_cached_lease_break(), cached_dir_lease_break() and cfids_laundromat_worker() functions in fs/smb/client/cached_dir.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114545
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-58239
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the tls_sw_recvmsg() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112282
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38180
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lec_itf_walk(), lec_seq_start() and lec_seq_stop() functions in net/atm/lec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112311
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38184
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tipc_udp_nl_dump_remoteip() function in net/tipc/udp_media.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112743
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38323
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the DEFINE_MUTEX(), lec_vcc_attach(), lecd_attach() and lane_ioctl() functions in net/atm/lec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113313
Risk: High
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2025-38352
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the run_posix_cpu_timers() function in kernel/time/posix-cpu-timers.c. A local user can escalate privileges on the system.
Note, the vulnerability is being actively exploited in the wild against Android devices.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU113260
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38460
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the DEFINE_MUTEX(), to_atmarpd(), atmarpd_close() and atm_init_atmarp() functions in net/atm/clip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113806
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38498
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
The vulnerability exists due to improperly imposed permissions within the do_change_type() function in fs/namespace.c. A local user can read and manipulate data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU113807
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38499
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the clone_private_mount() function in fs/namespace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114130
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38546
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the atm_init_atmarp() and clip_ioctl() functions in net/atm/clip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114242
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38555
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the composite_os_desc_req_prepare() function in drivers/usb/gadget/composite.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38560
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the early_set_pages_state() function in arch/x86/kernel/sev.c, within the setup_cpuid_table() and pvalidate_pages() functions in arch/x86/kernel/sev-shared.c, within the get_cpuflags() function in arch/x86/boot/cpuflags.c, within the __page_state_change() function in arch/x86/boot/compressed/sev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114234
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38563
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the perf_mmap_pfn_mkwrite() function in kernel/events/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114282
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38608
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the sk_psock_msg_verdict() function in net/tls/tls_sw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114533
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38617
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the packet_set_ring() function in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114500
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38618
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __vsock_bind_connectible() function in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114540
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38644
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the ieee80211_tdls_oper() function in net/mac80211/tdls.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
openSUSE Leap: 15.5
kernel-rt_debug: before 5.14.21-150500.13.106.1
kernel-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-livepatch-devel: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-extra: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt_debug-debuginfo: before 5.14.21-150500.13.106.1
kselftests-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-optional: before 5.14.21-150500.13.106.1
reiserfs-kmp-rt: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-debuginfo: before 5.14.21-150500.13.106.1
cluster-md-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt-vdso: before 5.14.21-150500.13.106.1
kernel-rt-extra-debuginfo: before 5.14.21-150500.13.106.1
dlm-kmp-rt: before 5.14.21-150500.13.106.1
kernel-rt_debug-devel: before 5.14.21-150500.13.106.1
kernel-rt-devel: before 5.14.21-150500.13.106.1
kernel-rt_debug-debugsource: before 5.14.21-150500.13.106.1
kernel-rt_debug-vdso: before 5.14.21-150500.13.106.1
kselftests-kmp-rt: before 5.14.21-150500.13.106.1
ocfs2-kmp-rt: before 5.14.21-150500.13.106.1
gfs2-kmp-rt-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-vdso-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-livepatch: before 5.14.21-150500.13.106.1
kernel-rt-optional-debuginfo: before 5.14.21-150500.13.106.1
kernel-rt-devel-debuginfo: before 5.14.21-150500.13.106.1
kernel-devel-rt: before 5.14.21-150500.13.106.1
kernel-source-rt: before 5.14.21-150500.13.106.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.