| Risk | Low |
| Patch available | YES |
| Number of vulnerabilities | 17 |
| CVE-ID | CVE-2022-49138 CVE-2022-49770 CVE-2023-52923 CVE-2023-52927 CVE-2024-26643 CVE-2024-53057 CVE-2024-53164 CVE-2024-57947 CVE-2025-37797 CVE-2025-38079 CVE-2025-38181 CVE-2025-38200 CVE-2025-38206 CVE-2025-38212 CVE-2025-38213 CVE-2025-38257 CVE-2025-38289 |
| CWE-ID | CWE-119 CWE-416 CWE-667 CWE-20 CWE-362 CWE-399 CWE-401 CWE-388 CWE-191 CWE-415 CWE-125 |
| Exploitation vector | Local |
| Public exploit | Public exploit code for vulnerability #4 is available. |
| Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system kernel-livepatch-SLE15-SP5_Update_29-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_116-default Operating systems & Components / Operating system package or component kernel-default-livepatch-devel Operating systems & Components / Operating system package or component kernel-default-livepatch Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_116-default-debuginfo Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 17 vulnerabilities.
EUVDB-ID: #VU104804
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49138
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the hci_conn_complete_evt(), hci_sync_conn_complete_evt() and le_conn_complete_evt() functions in net/bluetooth/hci_event.c, within the hci_conn_add() function in net/bluetooth/hci_conn.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108233
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49770
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ceph_update_snap_trace() function in fs/ceph/snap.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103086
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52923
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the nft_rbtree_cmp(), __nft_rbtree_lookup(), nft_rbtree_get(), nft_rbtree_gc_elem(), nft_rbtree_activate(), nft_rbtree_flush() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_drop(), pipapo_gc() and nft_pipapo_activate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_cmp(), nft_rhash_activate(), nft_rhash_flush(), nft_rhash_deactivate(), nft_rhash_gc() and nft_rhash_destroy() functions in net/netfilter/nft_set_hash.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105746
Risk: Low
CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-52927
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the nft_ct_set_zone_eval() and nft_ct_tmpl_alloc_pcpu() functions in net/netfilter/nft_ct.c, within the EXPORT_SYMBOL_GPL() and nf_ct_find_expectation() functions in net/netfilter/nf_conntrack_expect.c, within the init_conntrack() function in net/netfilter/nf_conntrack_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU88135
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26643
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the nf_tables_unbind_set() function in net/netfilter/nf_tables_api.c. A local user can exploit the race and escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU100707
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53057
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_tree_reduce_backlog() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53164
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the choke_drop_by_idx() function in net/sched/sch_choke.c, within the cake_drop() function in net/sched/sch_cake.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103269
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57947
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_pipapo_avx2_lookup_slow() function in net/netfilter/nft_set_pipapo_avx2.c, within the nft_pipapo_lookup() and pipapo_get() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37797
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hfsc_change_class() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111459
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38079
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hash_accept() function in crypto/algif_hash.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112316
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38181
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the calipso_req_setattr() and calipso_req_delattr() functions in net/ipv6/calipso.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112322
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38200
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the i40e_pf_reset() function in drivers/net/ethernet/intel/i40e/i40e_common.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112315
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38206
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the exfat_free_upcase_table() function in fs/exfat/nls.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112286
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38212
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the shm_try_destroy_orphaned() function in ipc/shm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112292
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38213
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the vgacon_scroll() function in drivers/video/console/vgacon.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112823
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38257
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the _copy_apqns_from_user() function in drivers/s390/crypto/pkey_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112747
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38289
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lpfc_dev_loss_tmo_callbk() function in drivers/scsi/lpfc/lpfc_hbadisc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-SLE15-SP5_Update_29-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_116-default: before 1-150500.11.3.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.116.1
kernel-default-livepatch: before 5.14.21-150500.55.116.1
kernel-livepatch-5_14_21-150500_55_116-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.116.1
kernel-default-debuginfo: before 5.14.21-150500.55.116.1
kernel-default-debugsource: before 5.14.21-150500.55.116.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252588-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.