SUSE update for the Linux Kernel



Risk High
Patch available YES
Number of vulnerabilities 258
CVE-ID CVE-2021-47557
CVE-2021-47595
CVE-2022-1679
CVE-2022-2585
CVE-2022-2586
CVE-2022-2905
CVE-2022-3903
CVE-2022-4095
CVE-2022-4662
CVE-2022-49934
CVE-2022-49935
CVE-2022-49936
CVE-2022-49937
CVE-2022-49938
CVE-2022-49940
CVE-2022-49942
CVE-2022-49943
CVE-2022-49944
CVE-2022-49945
CVE-2022-49946
CVE-2022-49948
CVE-2022-49949
CVE-2022-49950
CVE-2022-49951
CVE-2022-49952
CVE-2022-49954
CVE-2022-49956
CVE-2022-49957
CVE-2022-49958
CVE-2022-49960
CVE-2022-49962
CVE-2022-49963
CVE-2022-49964
CVE-2022-49965
CVE-2022-49966
CVE-2022-49968
CVE-2022-49969
CVE-2022-49971
CVE-2022-49972
CVE-2022-49977
CVE-2022-49978
CVE-2022-49980
CVE-2022-49981
CVE-2022-49982
CVE-2022-49983
CVE-2022-49984
CVE-2022-49985
CVE-2022-49986
CVE-2022-49987
CVE-2022-49989
CVE-2022-49990
CVE-2022-49993
CVE-2022-49995
CVE-2022-49999
CVE-2022-50002
CVE-2022-50003
CVE-2022-50005
CVE-2022-50006
CVE-2022-50008
CVE-2022-50010
CVE-2022-50011
CVE-2022-50012
CVE-2022-50015
CVE-2022-50016
CVE-2022-50019
CVE-2022-50020
CVE-2022-50021
CVE-2022-50022
CVE-2022-50023
CVE-2022-50024
CVE-2022-50026
CVE-2022-50027
CVE-2022-50028
CVE-2022-50029
CVE-2022-50030
CVE-2022-50031
CVE-2022-50032
CVE-2022-50033
CVE-2022-50034
CVE-2022-50035
CVE-2022-50036
CVE-2022-50037
CVE-2022-50038
CVE-2022-50039
CVE-2022-50040
CVE-2022-50041
CVE-2022-50044
CVE-2022-50045
CVE-2022-50046
CVE-2022-50047
CVE-2022-50049
CVE-2022-50050
CVE-2022-50051
CVE-2022-50052
CVE-2022-50053
CVE-2022-50054
CVE-2022-50055
CVE-2022-50059
CVE-2022-50060
CVE-2022-50061
CVE-2022-50062
CVE-2022-50065
CVE-2022-50066
CVE-2022-50067
CVE-2022-50068
CVE-2022-50072
CVE-2022-50073
CVE-2022-50074
CVE-2022-50076
CVE-2022-50077
CVE-2022-50079
CVE-2022-50083
CVE-2022-50084
CVE-2022-50085
CVE-2022-50086
CVE-2022-50087
CVE-2022-50092
CVE-2022-50093
CVE-2022-50094
CVE-2022-50095
CVE-2022-50097
CVE-2022-50098
CVE-2022-50099
CVE-2022-50100
CVE-2022-50101
CVE-2022-50102
CVE-2022-50103
CVE-2022-50104
CVE-2022-50108
CVE-2022-50109
CVE-2022-50110
CVE-2022-50111
CVE-2022-50112
CVE-2022-50115
CVE-2022-50116
CVE-2022-50117
CVE-2022-50118
CVE-2022-50120
CVE-2022-50121
CVE-2022-50124
CVE-2022-50125
CVE-2022-50126
CVE-2022-50127
CVE-2022-50129
CVE-2022-50131
CVE-2022-50132
CVE-2022-50133
CVE-2022-50134
CVE-2022-50135
CVE-2022-50136
CVE-2022-50137
CVE-2022-50138
CVE-2022-50139
CVE-2022-50140
CVE-2022-50141
CVE-2022-50142
CVE-2022-50143
CVE-2022-50144
CVE-2022-50145
CVE-2022-50146
CVE-2022-50149
CVE-2022-50151
CVE-2022-50152
CVE-2022-50153
CVE-2022-50154
CVE-2022-50155
CVE-2022-50156
CVE-2022-50157
CVE-2022-50158
CVE-2022-50160
CVE-2022-50161
CVE-2022-50162
CVE-2022-50164
CVE-2022-50165
CVE-2022-50166
CVE-2022-50169
CVE-2022-50171
CVE-2022-50172
CVE-2022-50173
CVE-2022-50175
CVE-2022-50176
CVE-2022-50178
CVE-2022-50179
CVE-2022-50181
CVE-2022-50183
CVE-2022-50184
CVE-2022-50185
CVE-2022-50186
CVE-2022-50187
CVE-2022-50188
CVE-2022-50190
CVE-2022-50191
CVE-2022-50192
CVE-2022-50194
CVE-2022-50196
CVE-2022-50197
CVE-2022-50198
CVE-2022-50199
CVE-2022-50200
CVE-2022-50201
CVE-2022-50202
CVE-2022-50203
CVE-2022-50204
CVE-2022-50206
CVE-2022-50207
CVE-2022-50208
CVE-2022-50209
CVE-2022-50211
CVE-2022-50212
CVE-2022-50213
CVE-2022-50215
CVE-2022-50218
CVE-2022-50220
CVE-2022-50221
CVE-2022-50222
CVE-2022-50226
CVE-2022-50228
CVE-2022-50229
CVE-2022-50231
CVE-2023-3111
CVE-2023-52924
CVE-2023-52925
CVE-2023-53046
CVE-2023-53048
CVE-2023-53076
CVE-2023-53097
CVE-2024-26808
CVE-2024-26924
CVE-2024-26935
CVE-2024-27397
CVE-2024-35840
CVE-2024-36978
CVE-2024-46800
CVE-2024-53125
CVE-2024-53141
CVE-2024-53197
CVE-2024-56770
CVE-2024-57999
CVE-2025-21700
CVE-2025-21702
CVE-2025-21703
CVE-2025-21756
CVE-2025-23141
CVE-2025-23145
CVE-2025-37752
CVE-2025-37798
CVE-2025-37823
CVE-2025-37890
CVE-2025-37932
CVE-2025-37948
CVE-2025-37953
CVE-2025-37963
CVE-2025-37997
CVE-2025-38000
CVE-2025-38001
CVE-2025-38014
CVE-2025-38060
CVE-2025-38083
CWE-ID CWE-476
CWE-119
CWE-416
CWE-399
CWE-125
CWE-415
CWE-284
CWE-667
CWE-401
CWE-388
CWE-20
CWE-191
CWE-835
CWE-369
CWE-404
CWE-362
CWE-617
CWE-682
CWE-908
CWE-825
CWE-200
CWE-787
Exploitation vector Local
Public exploit Public exploit code for vulnerability #4 is available.
Vulnerability #5 is being exploited in the wild.
Vulnerability #236 is being exploited in the wild.
Public exploit code for vulnerability #242 is available.
Public exploit code for vulnerability #255 is available.
Vulnerable software
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

SUSE Linux Enterprise Live Patching
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

kernel-livepatch-5_14_21-150500_55_113-default
Operating systems & Components / Operating system package or component

kernel-default-livepatch
Operating systems & Components / Operating system package or component

kernel-default-livepatch-devel
Operating systems & Components / Operating system package or component

kernel-default-debugsource
Operating systems & Components / Operating system package or component

kernel-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-livepatch-SLE15-SP5_Update_28-debugsource
Operating systems & Components / Operating system package or component

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo
Operating systems & Components / Operating system package or component

kernel-default
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains information about 258 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU90399

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47557

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ets_qdisc_change() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU93133

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47595

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the ets_qdisc_change() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU64861

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-1679

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ath9k_htc_wait_for_target() function in the Linux kernel’s Atheros wireless adapter driver. A local user can execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU66394

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2022-2585

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: Yes

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack or escalate privileges on the system.

The vulnerability exists due to improper management of internal resources in POSIX CPU timers when handling death of a process. A local user can crash the kernel or execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

5) Use-after-free

EUVDB-ID: #VU66396

Risk: Low

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]

CVE-ID: CVE-2022-2586

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the the netfilter subsystem implementation in Linux kernel when preventing one nft object from referencing an nft set in another nft table. A local user can trigger a use-after-free error and execute arbitrary code on the system with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

6) Out-of-bounds read

EUVDB-ID: #VU67509

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-2905

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the Linux kernel BPF subsystem. A local user can call the bpf_tail_call() function with a key larger than the max_entries of the map, trigger an out-of-bounds read and read parts of kernel memory.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Resource management error

EUVDB-ID: #VU70465

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-3903

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an incorrect read request flaw in the Infrared Transceiver USB driver in Linux kernel. An attacker with physical access to the system can starve system resources and perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Double Free

EUVDB-ID: #VU69805

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-4095

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the cmd_hdl_filter() function in drivers/staging/rtl8712/rtl8712_cmd.c. A local user can trigger a double free error and execute arbitrary code with escalated privileges.


Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper access control

EUVDB-ID: #VU71541

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-4662

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions in the Linux kernel USB core subsystem in the way user attaches usb device. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use-after-free

EUVDB-ID: #VU111444

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49934

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __ieee80211_scan_completed() function in net/mac80211/scan.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Use-after-free

EUVDB-ID: #VU111430

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49935

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the dma_resv_add_fence() function in drivers/dma-buf/dma-resv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Improper locking

EUVDB-ID: #VU111582

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49936

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the usb_reset_device() function in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Improper locking

EUVDB-ID: #VU111564

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49937

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mceusb_gen1_init() function in drivers/media/rc/mceusb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Memory leak

EUVDB-ID: #VU111400

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49938

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the SMB2_negotiate() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) NULL pointer dereference

EUVDB-ID: #VU111512

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49940

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the gsmld_receive_buf() function in drivers/tty/n_gsm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper error handling

EUVDB-ID: #VU111611

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49942

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ieee80211_ibss_finish_csa() function in net/mac80211/ibss.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Improper locking

EUVDB-ID: #VU111584

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49943

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the usb_gadget_disconnect(), gadget_bind_driver(), gadget_unbind_driver(), soft_connect_store() and function_show() functions in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) NULL pointer dereference

EUVDB-ID: #VU111545

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49944

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ucsi_unregister_connectors(), ucsi_init(), EXPORT_SYMBOL_GPL() and ucsi_unregister() functions in drivers/usb/typec/ucsi/ucsi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Out-of-bounds read

EUVDB-ID: #VU111487

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49945

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the gpio_fan_set_cur_state() function in drivers/hwmon/gpio-fan.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Out-of-bounds read

EUVDB-ID: #VU111472

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49946

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the raspberrypi_discover_clocks() function in drivers/clk/bcm/clk-raspberrypi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Out-of-bounds read

EUVDB-ID: #VU111486

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49948

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the con_font_set() and con_font_default() functions in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Memory leak

EUVDB-ID: #VU111358

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49949

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the fw_upload_start() function in drivers/base/firmware_loader/sysfs_upload.c, within the fw_dev_release() function in drivers/base/firmware_loader/sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Buffer overflow

EUVDB-ID: #VU111626

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49950

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the nft_set_elem_expr_clone() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Use-after-free

EUVDB-ID: #VU111445

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49951

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the firmware_upload_unregister() function in drivers/base/firmware_loader/sysfs_upload.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Buffer overflow

EUVDB-ID: #VU111627

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49952

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the fastrpc_cb_probe() function in drivers/misc/fastrpc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Improper locking

EUVDB-ID: #VU111585

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49954

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __iforce_usb_xmit() and iforce_usb_out() functions in drivers/input/joystick/iforce/iforce-usb.c, within the iforce_serio_xmit() and iforce_serio_irq() functions in drivers/input/joystick/iforce/iforce-serio.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) NULL pointer dereference

EUVDB-ID: #VU111514

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49956

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the r871x_internal_cmd_hdl() and cmd_hdl_filter() functions in drivers/staging/rtl8712/rtl8712_cmd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Improper locking

EUVDB-ID: #VU111586

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49957

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the kcm_attach() function in net/kcm/kcmsock.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Memory leak

EUVDB-ID: #VU111401

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49958

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dev_graft_qdisc(), attach_default_qdiscs() and dev_init_scheduler() functions in net/sched/sch_generic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) NULL pointer dereference

EUVDB-ID: #VU111515

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49960

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tgl_get_bw_info() function in drivers/gpu/drm/i915/display/intel_bw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) NULL pointer dereference

EUVDB-ID: #VU111516

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49962

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the xhci_plat_remove() function in drivers/usb/host/xhci-plat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Input validation error

EUVDB-ID: #VU111698

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49963

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the emit_copy(), scatter_list_length() and intel_context_migrate_copy() functions in drivers/gpu/drm/i915/gt/intel_migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Resource management error

EUVDB-ID: #VU111665

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49964

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ci_leaf_init() and init_cache_level() functions in arch/arm64/kernel/cacheinfo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Memory leak

EUVDB-ID: #VU111414

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49965

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0_0_ppt.c, drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0_7_ppt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Memory leak

EUVDB-ID: #VU111412

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49966

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the drivers/gpu/drm/amd/pm/swsmu/smu11/sienna_cichlid_ppt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Use-after-free

EUVDB-ID: #VU111446

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49968

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the r871x_internal_cmd_hdl() and cmd_hdl_filter() functions in drivers/staging/rtl8712/rtl8712_cmd.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Integer underflow

EUVDB-ID: #VU111624

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49969

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the optc1_enable_optc_clock() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_optc.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Memory leak

EUVDB-ID: #VU111411

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49971

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the smu_v13_0_4_fini_smc_tables() function in drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0_4_ppt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Buffer overflow

EUVDB-ID: #VU111659

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49972

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the xp_check_dma_contiguity() and xp_dma_map() functions in net/xdp/xsk_buff_pool.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) NULL pointer dereference

EUVDB-ID: #VU111519

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49977

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the ftrace_startup() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Input validation error

EUVDB-ID: #VU111606

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49978

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the fastrpc_cb_probe() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Use-after-free

EUVDB-ID: #VU111528

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49980

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the usb_udc_uevent() function in drivers/usb/gadget/udc/core.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Memory leak

EUVDB-ID: #VU111406

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49981

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the hidraw_release() function in drivers/hid/hidraw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Memory leak

EUVDB-ID: #VU111405

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49982

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pvr2_hdw_create() function in drivers/media/usb/pvrusb2/pvrusb2-hdw.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Resource management error

EUVDB-ID: #VU111666

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49983

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the udmabuf_dev_init() function in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) NULL pointer dereference

EUVDB-ID: #VU111538

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49984

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the steam_recv_report() and steam_send_report() functions in drivers/hid/hid-steam.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Out-of-bounds read

EUVDB-ID: #VU111484

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49985

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the record_func_key() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Use-after-free

EUVDB-ID: #VU111447

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49986

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the storvsc_probe() function in drivers/scsi/storvsc_drv.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Input validation error

EUVDB-ID: #VU111697

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49987

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the md_stop() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) NULL pointer dereference

EUVDB-ID: #VU111539

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49989

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the lock_pages() and privcmd_ioctl_dm_op() functions in drivers/xen/privcmd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Use-after-free

EUVDB-ID: #VU111448

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49990

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the arch_dup_task_struct() and copy_thread() functions in arch/s390/kernel/process.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

52) Infinite loop

EUVDB-ID: #VU111640

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49993

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the loop_set_status_from_info() function in drivers/block/loop.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

53) Use-after-free

EUVDB-ID: #VU111449

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49995

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the wb_inode_writeback_start() and wb_inode_writeback_end() functions in mm/page-writeback.c, within the wb_wakeup_delayed() and cgwb_remove_from_bdi_list() functions in mm/backing-dev.c, within the inode_io_list_move_locked(), wb_queue_work() and get_next_work_item() functions in fs/fs-writeback.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

54) Use-after-free

EUVDB-ID: #VU111529

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49999

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the btrfs_pin_extent_for_log_replay(), __exclude_logged_extent(), btrfs_block_group_done() and btrfs_trim_fs() functions in fs/btrfs/extent-tree.c, within the btrfs_wait_block_group_cache_progress(), btrfs_put_block_group(), btrfs_cache_block_group() and btrfs_update_block_group() functions in fs/btrfs/block-group.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

55) NULL pointer dereference

EUVDB-ID: #VU111521

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50002

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mlx5_lag_add_netdev() function in drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

56) Out-of-bounds read

EUVDB-ID: #VU111483

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50003

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the ice_xsk_pool_setup() function in drivers/net/ethernet/intel/ice/ice_xsk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

57) Use-after-free

EUVDB-ID: #VU111458

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50005

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pn532_uart_remove() function in drivers/nfc/pn533/uart.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

58) Memory leak

EUVDB-ID: #VU111402

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50006

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __nfs42_ssc_open() function in fs/nfs/nfs4file.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

59) Improper locking

EUVDB-ID: #VU111589

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50008

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __disable_kprobe() function in kernel/kprobes.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

60) Division by zero

EUVDB-ID: #VU111637

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50010

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the i740fb_decode_var() function in drivers/video/fbdev/i740fb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

61) Resource management error

EUVDB-ID: #VU111667

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50011

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the vcodec_domains_get() and core_get_v4() functions in drivers/media/platform/qcom/venus/pm_helpers.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

62) Resource management error

EUVDB-ID: #VU111655

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50012

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the early_init_devtree() function in arch/powerpc/kernel/prom.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

63) NULL pointer dereference

EUVDB-ID: #VU111540

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50015

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the hda_dsp_ipc4_irq_thread() and hda_dsp_ipc_irq_thread() functions in sound/soc/sof/intel/hda-ipc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

64) NULL pointer dereference

EUVDB-ID: #VU111541

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50016

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cnl_ipc4_irq_thread() and cnl_ipc_irq_thread() functions in sound/soc/sof/intel/cnl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

65) Memory leak

EUVDB-ID: #VU111395

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50019

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the soc_info() function in drivers/tty/serial/ucc_uart.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

66) Buffer overflow

EUVDB-ID: #VU111628

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50020

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ext4_resize_fs() function in fs/ext4/resize.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

67) Improper locking

EUVDB-ID: #VU111596

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50021

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the ext4_mb_clear_bb(), EXT4_C2B(), put_bh() and ext4_free_blocks() functions in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

68) Use-after-free

EUVDB-ID: #VU111457

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50022

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the raid5_end_write_request() function in drivers/md/raid5.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

69) Input validation error

EUVDB-ID: #VU111683

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50023

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the axi_chan_block_xfer_complete() function in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

70) NULL pointer dereference

EUVDB-ID: #VU111543

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50024

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the dw_axi_dma_chan_slave_config() function in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

71) Out-of-bounds read

EUVDB-ID: #VU111482

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50026

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the gaudi_parse_cb_no_ext_queue() function in drivers/misc/habanalabs/gaudi/gaudi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

72) Memory leak

EUVDB-ID: #VU111393

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50027

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the lpfc_sli4_issue_wqe() function in drivers/scsi/lpfc/lpfc_sli.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

73) Improper locking

EUVDB-ID: #VU111590

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50028

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the drivers/usb/gadget/legacy/inode.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

74) Improper resource shutdown or release

EUVDB-ID: #VU111688

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50029

CWE-ID: CWE-404 - Improper Resource Shutdown or Release

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to failure to properly release resources within the drivers/clk/qcom/gcc-ipq8074.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

75) Buffer overflow

EUVDB-ID: #VU111629

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50030

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the lpfc_debugfs_multixripools_write(), lpfc_debugfs_nvmestat_write(), lpfc_debugfs_ioktime_write(), lpfc_debugfs_nvmeio_trc_write() and lpfc_debugfs_hdwqstat_write() functions in drivers/scsi/lpfc/lpfc_debugfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

76) Use-after-free

EUVDB-ID: #VU111456

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50031

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the iscsi_iter_destroy_conn_fn() function in drivers/scsi/scsi_transport_iscsi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

77) Memory leak

EUVDB-ID: #VU111374

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50032

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the usbhs_rza1_hardware_init() function in drivers/usb/renesas_usbhs/rza.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

78) Memory leak

EUVDB-ID: #VU111376

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50033

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ohci_hcd_ppc_of_probe() function in drivers/usb/host/ohci-ppc-of.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

79) Use-after-free

EUVDB-ID: #VU111455

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50034

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cdns3_wa2_remove_old_request() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

80) Use-after-free

EUVDB-ID: #VU111454

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50035

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the amdgpu_cs_vm_handling() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

81) Integer underflow

EUVDB-ID: #VU111625

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50036

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to integer underflow within the sun6i_dsi_setup_timings() function in drivers/gpu/drm/sun4i/sun6i_mipi_dsi.c. A local user can execute arbitrary code.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

82) Memory leak

EUVDB-ID: #VU111377

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50037

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the intel_context_migrate_copy() function in drivers/gpu/drm/i915/gt/intel_migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

83) Memory leak

EUVDB-ID: #VU111379

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50038

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the meson_vpu_has_available_connectors() function in drivers/gpu/drm/meson/meson_drv.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

84) Input validation error

EUVDB-ID: #VU111684

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50039

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the intel_eth_pci_remove() function in drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

85) Buffer overflow

EUVDB-ID: #VU111630

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50040

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the sja1105_setup_devlink_regions() function in drivers/net/dsa/sja1105/sja1105_devlink.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

86) Resource management error

EUVDB-ID: #VU111656

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50041

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ice_reset_vf() function in drivers/net/ethernet/intel/ice/ice_vf_lib.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

87) Race condition

EUVDB-ID: #VU111648

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50044

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the qcom_mhi_qrtr_probe() function in net/qrtr/mhi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

88) Improper locking

EUVDB-ID: #VU111591

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50045

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the set_pci_dma_ops(), get_phb_number() and pcibios_alloc_controller() functions in arch/powerpc/kernel/pci-common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

89) Memory leak

EUVDB-ID: #VU111382

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50046

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the rpc_sysfs_xprt_state_change() function in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

90) NULL pointer dereference

EUVDB-ID: #VU111511

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50047

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the mv88e6060_setup_port() function in drivers/net/dsa/mv88e6060.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

91) Resource management error

EUVDB-ID: #VU111657

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50049

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the dpcm_get_be() function in sound/soc/soc-pcm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

92) Buffer overflow

EUVDB-ID: #VU111631

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50050

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the hda_dsp_dump_ext_rom_status() function in sound/soc/sof/intel/hda.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

93) Buffer overflow

EUVDB-ID: #VU111663

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50051

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the emit_copy(), scatter_list_length() and intel_context_migrate_copy() functions in drivers/gpu/drm/i915/gt/intel_migrate.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

94) Buffer overflow

EUVDB-ID: #VU111632

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50052

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the memory_info_update() function in sound/soc/sof/debug.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

95) Improper locking

EUVDB-ID: #VU111593

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50053

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

96) NULL pointer dereference

EUVDB-ID: #VU111494

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50054

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the iavf_init_get_resources() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

97) Memory leak

EUVDB-ID: #VU111384

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50055

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iavf_config_arq_regs(), iavf_init_asq() and iavf_init_arq() functions in drivers/net/ethernet/intel/iavf/iavf_adminq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

98) Memory leak

EUVDB-ID: #VU111386

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50059

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the handle_cap_grant() function in fs/ceph/caps.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

99) Memory leak

EUVDB-ID: #VU111373

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50060

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the npc_enadis_default_entries() and rvu_npc_enable_mcam_by_entry_index() functions in drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c, within the __rvu_flr_handler() function in drivers/net/ethernet/marvell/octeontx2/af/rvu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

100) Memory leak

EUVDB-ID: #VU111352

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50061

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nmk_pinctrl_dt_subnode_to_map() function in drivers/pinctrl/nomadik/pinctrl-nomadik.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

101) Improper error handling

EUVDB-ID: #VU111614

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50062

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the bgmac_dma_tx_add() function in drivers/net/ethernet/broadcom/bgmac.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

102) Memory leak

EUVDB-ID: #VU111353

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50065

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the receive_mergeable() function in drivers/net/virtio_net.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

103) Out-of-bounds read

EUVDB-ID: #VU111481

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50066

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the aq_nic_service_timer_cb(), aq_nic_get_regs_count(), aq_nic_get_stats(), aq_nic_set_loopback() and aq_nic_stop() functions in drivers/net/ethernet/aquantia/atlantic/aq_nic.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

104) Use-after-free

EUVDB-ID: #VU111530

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50067

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the prepare_to_relocate() function in fs/btrfs/relocation.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

105) Use-after-free

EUVDB-ID: #VU111452

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50068

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ttm_bo_validate() function in drivers/gpu/drm/ttm/ttm_bo.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

106) Use-after-free

EUVDB-ID: #VU111443

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50072

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the _nfs4_open_and_get_state() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

107) NULL pointer dereference

EUVDB-ID: #VU111499

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50073

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the tap_get_user() function in drivers/net/tap.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

108) Memory leak

EUVDB-ID: #VU111356

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50074

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the aa_simple_write_to_buffer() function in security/apparmor/apparmorfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

109) Memory leak

EUVDB-ID: #VU111329

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50076

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cifs_close_deferred_file(), cifs_close_all_deferred_files() and cifs_close_deferred_file_under_dentry() functions in fs/cifs/misc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

110) Memory leak

EUVDB-ID: #VU111327

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50077

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the aa_pivotroot() function in security/apparmor/mount.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

111) Out-of-bounds read

EUVDB-ID: #VU111480

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50079

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dcn303_stream_encoder_create() function in drivers/gpu/drm/amd/display/dc/dcn303/dcn303_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

112) Use-after-free

EUVDB-ID: #VU111451

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50083

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the fs/ext4/xattr.h. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

113) Out-of-bounds read

EUVDB-ID: #VU111479

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50084

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the raid_status() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

114) Infinite loop

EUVDB-ID: #VU111641

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50085

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the attempt_restore_of_faulty_devices() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

115) Buffer overflow

EUVDB-ID: #VU111660

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50086

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the wbt_init() function in block/blk-wbt.c, within the blk_iolatency_init() function in block/blk-iolatency.c, within the blk_iocost_init() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

116) Use-after-free

EUVDB-ID: #VU111421

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50087

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the scpi_init_versions() and scpi_probe() functions in drivers/firmware/arm_scpi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

117) Use-after-free

EUVDB-ID: #VU111422

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50092

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the pool_ctr() function in drivers/md/dm-thin.c, within the dm_pool_register_metadata_threshold() function in drivers/md/dm-thin-metadata.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

118) Input validation error

EUVDB-ID: #VU111695

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50093

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the dmar_parse_one_rhsa() function in drivers/iommu/intel/dmar.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

119) Out-of-bounds read

EUVDB-ID: #VU111478

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50094

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the include/trace/events/spmi.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

120) Use-after-free

EUVDB-ID: #VU111531

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50095

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the begin_new_exec() function in fs/exec.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

121) Input validation error

EUVDB-ID: #VU111694

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50097

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the s3fb_set_par() function in drivers/video/fbdev/s3fb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

122) Improper locking

EUVDB-ID: #VU111579

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50098

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the qla2xxx_eh_abort(), qla2x00_eh_wait_for_pending_commands(), qla2xxx_eh_device_reset() and qla2xxx_eh_target_reset() functions in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

123) Input validation error

EUVDB-ID: #VU111693

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50099

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the arkfb_set_par() function in drivers/video/fbdev/arkfb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

124) Improper locking

EUVDB-ID: #VU111578

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50100

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the cpus_share_cache() and ttwu_queue_cond() functions in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

125) Input validation error

EUVDB-ID: #VU111692

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50101

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the vt8623fb_set_par() function in drivers/video/fbdev/vt8623fb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

126) Division by zero

EUVDB-ID: #VU111638

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50102

CWE-ID: CWE-369 - Divide By Zero

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a division by zero error within the arkfb_set_par() function in drivers/video/fbdev/arkfb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

127) Out-of-bounds read

EUVDB-ID: #VU111477

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50103

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the cpuset_cpumask_can_shrink() and task_can_attach() functions in kernel/sched/core.c, within the cpuset_can_attach() function in kernel/cgroup/cpuset.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

128) Memory leak

EUVDB-ID: #VU111324

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50104

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xive_get_max_prio() function in arch/powerpc/sysdev/xive/spapr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

129) Memory leak

EUVDB-ID: #VU111318

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50108

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the max77620_initialise_fps() function in drivers/mfd/max77620.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

130) Memory leak

EUVDB-ID: #VU111317

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50109

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the clcdfb_of_init_display() function in drivers/video/fbdev/amba-clcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

131) Memory leak

EUVDB-ID: #VU111316

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50110

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iounmap() function in drivers/watchdog/sp5100_tco.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

132) Memory leak

EUVDB-ID: #VU111314

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50111

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mt6359_parse_dt() function in sound/soc/codecs/mt6359.c, within the mt6359_accdet_parse_dt() function in sound/soc/codecs/mt6359-accdet.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

133) Memory leak

EUVDB-ID: #VU111313

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50112

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qcom_smd_parse_edge() function in drivers/rpmsg/qcom_smd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

134) Use-after-free

EUVDB-ID: #VU111423

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50115

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sof_ipc3_control_load_bytes() function in sound/soc/sof/ipc3-topology.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

135) Improper locking

EUVDB-ID: #VU111576

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50116

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the gsm_queue(), gsmld_output(), gsm_stuff_frame(), gsm_data_alloc(), gsm_is_flow_ctrl_msg(), __gsm_data_queue(), gsm_dlci_modem_output(), gsm_control_message(), gsm_control_wait(), gsm_dlci_close(), gsm_dlci_open(), gsm1_receive(), gsm_cleanup_mux(), gsm_activate_mux(), gsm_alloc_mux() and gsmld_open() functions in drivers/tty/n_gsm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

136) Memory leak

EUVDB-ID: #VU111302

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50117

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the vfio_ioctl_device_feature_mig_device_state() and vfio_ioctl_device_feature_migration() functions in drivers/vfio/vfio.c, within the vfio_pci_core_register_device() function in drivers/vfio/pci/vfio_pci_core.c, within the mlx5vf_pci_close_device() and mlx5vf_pci_probe() functions in drivers/vfio/pci/mlx5/main.c, within the mlx5vf_cmd_remove_migratable() and mlx5vf_cmd_set_migratable() functions in drivers/vfio/pci/mlx5/cmd.c, within the hisi_acc_vfio_pci_open_device(), hisi_acc_vfio_pci_close_device() and hisi_acc_vfio_pci_probe() functions in drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

137) Infinite loop

EUVDB-ID: #VU111642

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50118

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the power_pmu_disable() function in arch/powerpc/perf/core-book3s.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

138) Memory leak

EUVDB-ID: #VU111300

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50120

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

139) Memory leak

EUVDB-ID: #VU111299

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50121

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the k3_r5_cluster_of_init() function in drivers/remoteproc/ti_k3_r5_remoteproc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

140) Memory leak

EUVDB-ID: #VU111296

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50124

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mt6797_mt6351_dev_probe() function in sound/soc/mediatek/mt6797/mt6797-mt6351.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

141) Memory leak

EUVDB-ID: #VU111295

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50125

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the cros_ec_codec_platform_probe() function in sound/soc/codecs/cros_ec_codec.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

142) Reachable assertion

EUVDB-ID: #VU111609

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50126

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to reachable assertion within the jbd2_journal_dirty_metadata() function in fs/jbd2/transaction.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

143) Improper locking

EUVDB-ID: #VU111575

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50127

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the rxe_qp_init_misc(), rxe_qp_init_req() and rxe_qp_init_resp() functions in drivers/infiniband/sw/rxe/rxe_qp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

144) Use-after-free

EUVDB-ID: #VU111532

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50129

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the srpt_refresh_port(), srpt_cm_req_recv(), srpt_release_sport(), __srpt_lookup_wwn(), srpt_add_one(), srpt_wwn_to_sport_id() and srpt_make_tport() functions in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

145) Buffer overflow

EUVDB-ID: #VU111633

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50131

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the mcp_smbus_write() function in drivers/hid/hid-mcp2221.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

146) NULL pointer dereference

EUVDB-ID: #VU111503

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50132

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the cdns3_gadget_ep_enable() and cdns3_gadget_ep_dequeue() functions in drivers/usb/cdns3/gadget.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

147) NULL pointer dereference

EUVDB-ID: #VU111504

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50133

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() function in drivers/usb/core/hcd.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

148) Memory leak

EUVDB-ID: #VU111294

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50134

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the setup_base_ctxt() function in drivers/infiniband/hw/hfi1/file_ops.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

149) NULL pointer dereference

EUVDB-ID: #VU111505

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50135

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rxe_qp_do_cleanup() function in drivers/infiniband/sw/rxe/rxe_qp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

150) Improper error handling

EUVDB-ID: #VU111615

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50136

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the siw_proc_mpareply() function in drivers/infiniband/sw/siw/siw_cm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

151) Use-after-free

EUVDB-ID: #VU111424

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50137

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the irdma_destroy_cq() function in drivers/infiniband/hw/irdma/verbs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

152) Memory leak

EUVDB-ID: #VU111293

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50138

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __qedr_alloc_mr() function in drivers/infiniband/hw/qedr/verbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

153) Memory leak

EUVDB-ID: #VU111274

Risk: Medium

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-50139

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ast_vhub_init_desc() function in drivers/usb/gadget/udc/aspeed-vhub/hub.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

154) Memory leak

EUVDB-ID: #VU111276

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50140

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the msb_data_clear() function in drivers/memstick/core/ms_block.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

155) Memory leak

EUVDB-ID: #VU111291

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50141

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the esdhc_signal_voltage_switch() function in drivers/mmc/host/sdhci-of-esdhc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

156) Incorrect calculation

EUVDB-ID: #VU111675

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50142

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation within the msc_buffer_set_uc(), __msc_buffer_win_free() and for_each_sg() functions in drivers/hwtracing/intel_th/msu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

157) Memory leak

EUVDB-ID: #VU111290

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50143

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the intel_th_pci_probe() function in drivers/hwtracing/intel_th/pci.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

158) Use-after-free

EUVDB-ID: #VU111425

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50144

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sdw_do_port_prep() and sdw_notify_config() functions in drivers/soundwire/stream.c, within the sdw_slave_release() and sdw_slave_add() functions in drivers/soundwire/slave.c, within the sdw_drv_probe() and sdw_drv_remove() functions in drivers/soundwire/bus_type.c, within the sdw_slave_clk_stop_callback(), sdw_handle_slave_alerts() and sdw_update_slave_status() functions in drivers/soundwire/bus.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

159) NULL pointer dereference

EUVDB-ID: #VU111506

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50145

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the to_sf_pdma_desc(), sf_pdma_prep_dma_memcpy(), sf_pdma_desc_residue(), sf_pdma_enable_request(), sf_pdma_issue_pending() and sf_pdma_donebh_tasklet() functions in drivers/dma/sf-pdma/sf-pdma.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

160) Memory leak

EUVDB-ID: #VU111289

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50146

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the dw_pcie_ep_init() function in drivers/pci/controller/dwc/pcie-designware-ep.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

161) Use-after-free

EUVDB-ID: #VU111426

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50149

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __driver_attach_async_helper() and __driver_attach() functions in drivers/base/dd.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

162) Use-after-free

EUVDB-ID: #VU111427

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50151

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cdns3_allocate_trb_pool() function in drivers/usb/cdns3/cdns3-gadget.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

163) Memory leak

EUVDB-ID: #VU111288

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50152

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ohci_hcd_nxp_probe() function in drivers/usb/host/ohci-nxp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

164) Memory leak

EUVDB-ID: #VU111287

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50153

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ehci_hcd_ppc_of_probe() function in drivers/usb/host/ehci-ppc-of.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

165) Memory leak

EUVDB-ID: #VU111286

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50154

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mtk_pcie_init_irq_domains() and irq_domain_remove() functions in drivers/pci/controller/pcie-mediatek-gen3.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

166) Memory leak

EUVDB-ID: #VU111285

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50155

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bcm4908_partitions_fw_offset() function in drivers/mtd/parsers/ofpart_bcm4908.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

167) Buffer overflow

EUVDB-ID: #VU111634

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50156

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the cp2112_xfer() function in drivers/hid/hid-cp2112.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

168) Memory leak

EUVDB-ID: #VU111284

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50157

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mc_pcie_init_irq_domains() function in drivers/pci/controller/pcie-microchip-host.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

169) Memory leak

EUVDB-ID: #VU111282

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50158

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the parse_redboot_of() function in drivers/mtd/parsers/redboot.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

170) Memory leak

EUVDB-ID: #VU111279

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50160

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ap_flash_init() function in drivers/mtd/maps/physmap-versatile.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

171) Memory leak

EUVDB-ID: #VU111277

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50161

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the of_flash_probe_versatile() function in drivers/mtd/maps/physmap-versatile.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

172) Memory leak

EUVDB-ID: #VU111292

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50162

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the if_usb_probe() function in drivers/net/wireless/marvell/libertas/if_usb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

173) Improper error handling

EUVDB-ID: #VU111616

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50164

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the iwl_mvm_disable_sta_queues() function in drivers/net/wireless/intel/iwlwifi/mvm/sta.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

174) Use of uninitialized resource

EUVDB-ID: #VU111621

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50165

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the wil_write_file_wmi() function in drivers/net/wireless/ath/wil6210/debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

175) Improper locking

EUVDB-ID: #VU111574

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50166

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the handle_cmd_cnt_and_timer() function in net/bluetooth/hci_event.c, within the hci_dev_do_reset() and hci_cmd_work() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

176) Memory leak

EUVDB-ID: #VU111311

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50169

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the wil_write_file_wmi() function in drivers/net/wireless/ath/wil6210/debugfs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

177) Improper locking

EUVDB-ID: #VU111573

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50171

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the sec_alloc_req_id(), sec_free_req_id(), sec_bd_send(), sec_create_qp_ctx() and sec_back_req_clear() functions in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

178) Memory leak

EUVDB-ID: #VU111320

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50172

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the __mt76x02u_mcu_send_msg() function in drivers/net/wireless/mediatek/mt76/mt76x02_usb_mcu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

179) Improper locking

EUVDB-ID: #VU111571

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50173

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the mdp5_pipe_release() function in drivers/gpu/drm/msm/disp/mdp5/mdp5_pipe.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

180) Memory leak

EUVDB-ID: #VU111357

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50175

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the tw686x_video_init() function in drivers/media/pci/tw686x/tw686x-video.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

181) Memory leak

EUVDB-ID: #VU111330

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50176

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the mcde_dsi_bind() function in drivers/gpu/drm/mcde/mcde_dsi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

182) Improper error handling

EUVDB-ID: #VU111617

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50178

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the _dpk_pas_read() function in drivers/net/wireless/realtek/rtw89/rtw8852a_rfk.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

183) Use-after-free

EUVDB-ID: #VU111429

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50179

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ath9k_htc_probe_device() function in drivers/net/wireless/ath/ath9k/htc_drv_init.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

184) NULL pointer dereference

EUVDB-ID: #VU111508

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50181

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the virtio_gpu_get_caps_ioctl() function in drivers/gpu/drm/virtio/virtgpu_ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

185) Memory leak

EUVDB-ID: #VU111359

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50183

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the meson_encoder_cvbs_init() function in drivers/gpu/drm/meson/meson_encoder_cvbs.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

186) Memory leak

EUVDB-ID: #VU111360

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50184

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the meson_encoder_hdmi_init() function in drivers/gpu/drm/meson/meson_encoder_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

187) Buffer overflow

EUVDB-ID: #VU111635

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50185

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the ni_set_mc_special_registers() function in drivers/gpu/drm/radeon/ni_dpm.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

188) Use-after-free

EUVDB-ID: #VU111420

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50186

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ath11k_htc_tx_completion_handler() function in drivers/net/wireless/ath/ath11k/htc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

189) Improper error handling

EUVDB-ID: #VU111618

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50187

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the ath11k_core_pdev_create() function in drivers/net/wireless/ath/ath11k/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

190) Memory leak

EUVDB-ID: #VU111361

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50188

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the meson_encoder_hdmi_init() function in drivers/gpu/drm/meson/meson_encoder_hdmi.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

191) Use-after-free

EUVDB-ID: #VU111431

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50190

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and devm_spi_unregister() functions in drivers/spi/spi.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

192) Memory leak

EUVDB-ID: #VU111363

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50191

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the of_get_regulation_constraints() function in drivers/regulator/of_regulator.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

193) Use-after-free

EUVDB-ID: #VU111432

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50192

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the tegra_slink_remove() function in drivers/spi/spi-tegra20-slink.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

194) Memory leak

EUVDB-ID: #VU111304

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50194

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the qmp_cooling_devices_register() function in drivers/soc/qcom/qcom_aoss.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

195) Memory leak

EUVDB-ID: #VU111364

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50196

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the of_get_ocmem() function in drivers/soc/qcom/ocmem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

196) Memory leak

EUVDB-ID: #VU111365

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50197

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the zynq_get_revision() function in arch/arm/mach-zynq/common.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

197) Memory leak

EUVDB-ID: #VU111367

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50198

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the omap3xxx_prm_late_init() function in arch/arm/mach-omap2/prm3xxx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

198) Memory leak

EUVDB-ID: #VU111368

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50199

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the omapdss_init_of() function in arch/arm/mach-omap2/display.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

199) Out-of-bounds read

EUVDB-ID: #VU111474

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50200

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the security/selinux/ss/policydb.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

200) Memory leak

EUVDB-ID: #VU111369

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50201

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the security_read_policy() and security_read_state_kernel() functions in security/selinux/ss/services.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

201) Improper locking

EUVDB-ID: #VU111567

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50202

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the snapshot_open(), snapshot_write() and snapshot_ioctl() functions in kernel/power/user.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

202) Memory leak

EUVDB-ID: #VU111370

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50203

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the omapdss_init_fbdev() function in arch/arm/mach-omap2/display.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

203) Memory leak

EUVDB-ID: #VU111371

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50204

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the pdata_quirks_init_clocks() function in arch/arm/mach-omap2/pdata-quirks.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

204) NULL pointer dereference

EUVDB-ID: #VU111509

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50206

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the LIST_HEAD(), emulation_proc_handler() and register_insn_emulation_sysctl() functions in arch/arm64/kernel/armv8_deprecated.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

205) Memory leak

EUVDB-ID: #VU111392

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50207

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the bcm_kona_smc_init() function in arch/arm/mach-bcm/bcm_kona_smc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

206) Memory leak

EUVDB-ID: #VU111391

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50208

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the meson_secure_pwrc_probe() function in drivers/soc/amlogic/meson-secure-pwrc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

207) Memory leak

EUVDB-ID: #VU111306

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50209

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the meson_mx_socinfo_init() function in drivers/soc/amlogic/meson-mx-socinfo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

208) Use-after-free

EUVDB-ID: #VU111433

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50211

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the raid10_remove_disk() function in drivers/md/raid10.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

209) Use-after-free

EUVDB-ID: #VU111434

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50212

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nft_chain_lookup_byid(), nf_tables_newrule() and nft_verdict_init() functions in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

210) Use-after-free

EUVDB-ID: #VU111435

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50213

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the nft_set_lookup_byhandle(), nft_set_lookup_byid() and nft_set_lookup_global() functions in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

211) Use-after-free

EUVDB-ID: #VU111534

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50215

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the sg_link_reserve(), sg_read(), sg_ioctl_common(), sg_unlink_reserve() and sg_remove_request() functions in drivers/scsi/sg.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

212) NULL pointer dereference

EUVDB-ID: #VU111510

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50218

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the isl29028_probe() function in drivers/iio/light/isl29028.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

213) Use-after-free

EUVDB-ID: #VU111440

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50220

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the drivers/net/usb/usbnet.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

214) Out-of-bounds read

EUVDB-ID: #VU111473

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50221

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the drm_fb_helper_damage() and drm_fb_helper_memory_range_to_clip() functions in drivers/gpu/drm/drm_fb_helper.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

215) Buffer overflow

EUVDB-ID: #VU111680

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50222

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the vc_uniscr_alloc() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

216) Memory leak

EUVDB-ID: #VU111305

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50226

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the sev_ioctl_do_platform_status(), sev_ioctl_do_pek_csr(), sev_ioctl_do_get_id2() and sev_ioctl_do_pdh_export() functions in drivers/crypto/ccp/sev-dev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

217) Improper error handling

EUVDB-ID: #VU111619

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50228

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the svm_set_irq() function in arch/x86/kvm/svm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

218) Use-after-free

EUVDB-ID: #VU111441

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50229

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bcd2000_init_midi() function in sound/usb/bcd2000/bcd2000.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

219) Use-after-free

EUVDB-ID: #VU111442

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-50231

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the neon_poly1305_blocks() function in arch/arm64/crypto/poly1305-glue.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

220) Use-after-free

EUVDB-ID: #VU77911

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-3111

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the prepare_to_relocate() function in fs/btrfs/relocation.c in btrfs in the Linux Kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

221) Memory leak

EUVDB-ID: #VU103660

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52924

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the nft_rbtree_walk() function in net/netfilter/nft_set_rbtree.c, within the nft_rhash_walk() function in net/netfilter/nft_set_hash.c, within the nf_tables_dump_setelem() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

222) Resource management error

EUVDB-ID: #VU103661

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-52925

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the nft_pipapo_get(), nft_pipapo_activate() and nft_pipapo_remove() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

223) Use-after-free

EUVDB-ID: #VU108438

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53046

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hci_cmd_sync_clear() function in net/bluetooth/hci_sync.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

224) Resource management error

EUVDB-ID: #VU108502

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53048

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tcpm_ams_start() and vdm_run_state_machine() functions in drivers/usb/typec/tcpm/tcpm.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

225) Resource management error

EUVDB-ID: #VU108494

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53076

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the replace_barrier() and i915_active_add_request() functions in drivers/gpu/drm/i915/i915_active.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

226) Memory leak

EUVDB-ID: #VU108399

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53097

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the iommu_debugfs_add() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

227) Expired pointer dereference

EUVDB-ID: #VU93809

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26808

CWE-ID: CWE-825 - Expired pointer dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a stale reference within the nf_tables_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

228) Resource management error

EUVDB-ID: #VU89055

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26924

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the nft_pipapo_remove() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

229) Information disclosure

EUVDB-ID: #VU91358

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26935

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can gain access to sensitive information.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

230) Improper locking

EUVDB-ID: #VU92027

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27397

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

231) Resource management error

EUVDB-ID: #VU93429

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35840

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the subflow_finish_connect() function in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

232) Out-of-bounds read

EUVDB-ID: #VU92332

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-36978

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the multiq_tune() function in net/sched/sch_multiq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

233) Use-after-free

EUVDB-ID: #VU97501

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46800

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

234) Resource management error

EUVDB-ID: #VU101233

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53125

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the find_equal_scalars() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

235) Input validation error

EUVDB-ID: #VU101348

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53141

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

236) Out-of-bounds write

EUVDB-ID: #VU102090

Risk: High

CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2024-53197

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to compromise the affected system.

The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.

Note, the vulnerability is being actively exploited against Android devices.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.

237) Resource management error

EUVDB-ID: #VU102490

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56770

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the tfifo_reset(), tfifo_enqueue(), netem_enqueue() and netem_dequeue() functions in net/sched/sch_netem.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

238) Improper locking

EUVDB-ID: #VU105029

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-57999

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the enable_ddw() and spapr_tce_create_table() functions in arch/powerpc/platforms/pseries/iommu.c, within the iommu_table_clear() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

239) Use-after-free

EUVDB-ID: #VU103959

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21700

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

240) Resource management error

EUVDB-ID: #VU104074

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21702

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

241) Use-after-free

EUVDB-ID: #VU104073

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21703

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

242) Use-after-free

EUVDB-ID: #VU104945

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2025-21756

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and __vsock_release() functions in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

243) Improper locking

EUVDB-ID: #VU108317

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23141

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the kvm_arch_vcpu_ioctl_get_mpstate() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

244) NULL pointer dereference

EUVDB-ID: #VU108299

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-23145

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

245) Out-of-bounds read

EUVDB-ID: #VU108259

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37752

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the sfq_change() function in net/sched/sch_sfq.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

246) Input validation error

EUVDB-ID: #VU108390

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37798

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the qdisc_bstats_update() function in net/sched/sch_fq_codel.c, within the codel_qdisc_dequeue() function in net/sched/sch_codel.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

247) Input validation error

EUVDB-ID: #VU108825

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37823

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the hfsc_dequeue() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

248) Use-after-free

EUVDB-ID: #VU109282

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37890

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfsc_enqueue() function in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

249) Resource management error

EUVDB-ID: #VU109572

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37932

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the htb_qlen_notify() function in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

250) Input validation error

EUVDB-ID: #VU109581

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37948

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the pr_fmt(), build_plt(), build_epilogue() and bpf_int_jit_compile() functions in arch/arm64/net/bpf_jit_comp.c, within the this_cpu_set_vectors() function in arch/arm64/kernel/proton-pack.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

251) NULL pointer dereference

EUVDB-ID: #VU109526

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37953

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the htb_add_to_wait_tree(), htb_activate(), htb_qlen_notify(), htb_delete() and htb_change_class() functions in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

252) Input validation error

EUVDB-ID: #VU109582

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37963

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the build_bhb_mitigation() function in arch/arm64/net/bpf_jit_comp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

253) Improper locking

EUVDB-ID: #VU109954

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37997

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the net/netfilter/ipset/ip_set_hash_gen.h. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

254) Use-after-free

EUVDB-ID: #VU110683

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38000

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hfsc_enqueue() function in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

255) Use-after-free

EUVDB-ID: #VU110681

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2025-38001

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the cl_in_el_or_vttree(), hfsc_change_class() and hfsc_enqueue() functions in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

256) Input validation error

EUVDB-ID: #VU111704

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38014

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the f2fs_new_node_page() function in fs/f2fs/node.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

257) Infinite loop

EUVDB-ID: #VU111643

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38060

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop within the copy_verifier_state() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

258) Race condition

EUVDB-ID: #VU111647

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-38083

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the prio_tune() function in net/sched/sch_prio.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package the Linux Kernel to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

SUSE Linux Enterprise Live Patching: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1

kernel-default-livepatch: before 5.14.21-150500.55.113.1

kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1

kernel-default-debugsource: before 5.14.21-150500.55.113.1

kernel-default-debuginfo: before 5.14.21-150500.55.113.1

kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1

kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1

kernel-default: before 5.14.21-150500.55.113.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###