| Risk | High |
| Patch available | YES |
| Number of vulnerabilities | 258 |
| CVE-ID | CVE-2021-47557 CVE-2021-47595 CVE-2022-1679 CVE-2022-2585 CVE-2022-2586 CVE-2022-2905 CVE-2022-3903 CVE-2022-4095 CVE-2022-4662 CVE-2022-49934 CVE-2022-49935 CVE-2022-49936 CVE-2022-49937 CVE-2022-49938 CVE-2022-49940 CVE-2022-49942 CVE-2022-49943 CVE-2022-49944 CVE-2022-49945 CVE-2022-49946 CVE-2022-49948 CVE-2022-49949 CVE-2022-49950 CVE-2022-49951 CVE-2022-49952 CVE-2022-49954 CVE-2022-49956 CVE-2022-49957 CVE-2022-49958 CVE-2022-49960 CVE-2022-49962 CVE-2022-49963 CVE-2022-49964 CVE-2022-49965 CVE-2022-49966 CVE-2022-49968 CVE-2022-49969 CVE-2022-49971 CVE-2022-49972 CVE-2022-49977 CVE-2022-49978 CVE-2022-49980 CVE-2022-49981 CVE-2022-49982 CVE-2022-49983 CVE-2022-49984 CVE-2022-49985 CVE-2022-49986 CVE-2022-49987 CVE-2022-49989 CVE-2022-49990 CVE-2022-49993 CVE-2022-49995 CVE-2022-49999 CVE-2022-50002 CVE-2022-50003 CVE-2022-50005 CVE-2022-50006 CVE-2022-50008 CVE-2022-50010 CVE-2022-50011 CVE-2022-50012 CVE-2022-50015 CVE-2022-50016 CVE-2022-50019 CVE-2022-50020 CVE-2022-50021 CVE-2022-50022 CVE-2022-50023 CVE-2022-50024 CVE-2022-50026 CVE-2022-50027 CVE-2022-50028 CVE-2022-50029 CVE-2022-50030 CVE-2022-50031 CVE-2022-50032 CVE-2022-50033 CVE-2022-50034 CVE-2022-50035 CVE-2022-50036 CVE-2022-50037 CVE-2022-50038 CVE-2022-50039 CVE-2022-50040 CVE-2022-50041 CVE-2022-50044 CVE-2022-50045 CVE-2022-50046 CVE-2022-50047 CVE-2022-50049 CVE-2022-50050 CVE-2022-50051 CVE-2022-50052 CVE-2022-50053 CVE-2022-50054 CVE-2022-50055 CVE-2022-50059 CVE-2022-50060 CVE-2022-50061 CVE-2022-50062 CVE-2022-50065 CVE-2022-50066 CVE-2022-50067 CVE-2022-50068 CVE-2022-50072 CVE-2022-50073 CVE-2022-50074 CVE-2022-50076 CVE-2022-50077 CVE-2022-50079 CVE-2022-50083 CVE-2022-50084 CVE-2022-50085 CVE-2022-50086 CVE-2022-50087 CVE-2022-50092 CVE-2022-50093 CVE-2022-50094 CVE-2022-50095 CVE-2022-50097 CVE-2022-50098 CVE-2022-50099 CVE-2022-50100 CVE-2022-50101 CVE-2022-50102 CVE-2022-50103 CVE-2022-50104 CVE-2022-50108 CVE-2022-50109 CVE-2022-50110 CVE-2022-50111 CVE-2022-50112 CVE-2022-50115 CVE-2022-50116 CVE-2022-50117 CVE-2022-50118 CVE-2022-50120 CVE-2022-50121 CVE-2022-50124 CVE-2022-50125 CVE-2022-50126 CVE-2022-50127 CVE-2022-50129 CVE-2022-50131 CVE-2022-50132 CVE-2022-50133 CVE-2022-50134 CVE-2022-50135 CVE-2022-50136 CVE-2022-50137 CVE-2022-50138 CVE-2022-50139 CVE-2022-50140 CVE-2022-50141 CVE-2022-50142 CVE-2022-50143 CVE-2022-50144 CVE-2022-50145 CVE-2022-50146 CVE-2022-50149 CVE-2022-50151 CVE-2022-50152 CVE-2022-50153 CVE-2022-50154 CVE-2022-50155 CVE-2022-50156 CVE-2022-50157 CVE-2022-50158 CVE-2022-50160 CVE-2022-50161 CVE-2022-50162 CVE-2022-50164 CVE-2022-50165 CVE-2022-50166 CVE-2022-50169 CVE-2022-50171 CVE-2022-50172 CVE-2022-50173 CVE-2022-50175 CVE-2022-50176 CVE-2022-50178 CVE-2022-50179 CVE-2022-50181 CVE-2022-50183 CVE-2022-50184 CVE-2022-50185 CVE-2022-50186 CVE-2022-50187 CVE-2022-50188 CVE-2022-50190 CVE-2022-50191 CVE-2022-50192 CVE-2022-50194 CVE-2022-50196 CVE-2022-50197 CVE-2022-50198 CVE-2022-50199 CVE-2022-50200 CVE-2022-50201 CVE-2022-50202 CVE-2022-50203 CVE-2022-50204 CVE-2022-50206 CVE-2022-50207 CVE-2022-50208 CVE-2022-50209 CVE-2022-50211 CVE-2022-50212 CVE-2022-50213 CVE-2022-50215 CVE-2022-50218 CVE-2022-50220 CVE-2022-50221 CVE-2022-50222 CVE-2022-50226 CVE-2022-50228 CVE-2022-50229 CVE-2022-50231 CVE-2023-3111 CVE-2023-52924 CVE-2023-52925 CVE-2023-53046 CVE-2023-53048 CVE-2023-53076 CVE-2023-53097 CVE-2024-26808 CVE-2024-26924 CVE-2024-26935 CVE-2024-27397 CVE-2024-35840 CVE-2024-36978 CVE-2024-46800 CVE-2024-53125 CVE-2024-53141 CVE-2024-53197 CVE-2024-56770 CVE-2024-57999 CVE-2025-21700 CVE-2025-21702 CVE-2025-21703 CVE-2025-21756 CVE-2025-23141 CVE-2025-23145 CVE-2025-37752 CVE-2025-37798 CVE-2025-37823 CVE-2025-37890 CVE-2025-37932 CVE-2025-37948 CVE-2025-37953 CVE-2025-37963 CVE-2025-37997 CVE-2025-38000 CVE-2025-38001 CVE-2025-38014 CVE-2025-38060 CVE-2025-38083 |
| CWE-ID | CWE-476 CWE-119 CWE-416 CWE-399 CWE-125 CWE-415 CWE-284 CWE-667 CWE-401 CWE-388 CWE-20 CWE-191 CWE-835 CWE-369 CWE-404 CWE-362 CWE-617 CWE-682 CWE-908 CWE-825 CWE-200 CWE-787 |
| Exploitation vector | Local |
| Public exploit |
Public exploit code for vulnerability #4 is available. Vulnerability #5 is being exploited in the wild. Vulnerability #236 is being exploited in the wild. Public exploit code for vulnerability #242 is available. Public exploit code for vulnerability #255 is available. |
| Vulnerable software |
SUSE Linux Enterprise Micro Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system kernel-livepatch-5_14_21-150500_55_113-default Operating systems & Components / Operating system package or component kernel-default-livepatch Operating systems & Components / Operating system package or component kernel-default-livepatch-devel Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP5_Update_28-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-5_14_21-150500_55_113-default-debuginfo Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 258 vulnerabilities.
EUVDB-ID: #VU90399
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47557
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ets_qdisc_change() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93133
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47595
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ets_qdisc_change() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64861
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-1679
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ath9k_htc_wait_for_target() function in the Linux kernel’s Atheros wireless adapter driver. A local user can execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66394
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2022-2585
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack or escalate privileges on the system.
The vulnerability exists due to improper management of internal resources in POSIX CPU timers when handling death of a process. A local user can crash the kernel or execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU66396
Risk: Low
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID: CVE-2022-2586
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the netfilter subsystem implementation in Linux kernel when preventing one nft object from referencing an nft set in another nft table. A local user can trigger a use-after-free error and execute arbitrary code on the system with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU67509
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2905
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the Linux kernel BPF subsystem. A local user can call the bpf_tail_call() function with a key larger than the max_entries of the map, trigger an out-of-bounds read and read parts of kernel memory.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70465
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3903
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows an attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to an incorrect read request flaw in the Infrared Transceiver USB driver in Linux kernel. An attacker with physical access to the system can starve system resources and perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69805
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-4095
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the cmd_hdl_filter() function in drivers/staging/rtl8712/rtl8712_cmd.c. A local user can trigger a double free error and execute arbitrary code with escalated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU71541
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-4662
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper access restrictions in the Linux kernel USB core subsystem in the way user attaches usb device. A local user can perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111444
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49934
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __ieee80211_scan_completed() function in net/mac80211/scan.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111430
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49935
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the dma_resv_add_fence() function in drivers/dma-buf/dma-resv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111582
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49936
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the usb_reset_device() function in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111564
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49937
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mceusb_gen1_init() function in drivers/media/rc/mceusb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111400
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49938
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the SMB2_negotiate() function in fs/cifs/smb2pdu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111512
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49940
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the gsmld_receive_buf() function in drivers/tty/n_gsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111611
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49942
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ieee80211_ibss_finish_csa() function in net/mac80211/ibss.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111584
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49943
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the usb_gadget_disconnect(), gadget_bind_driver(), gadget_unbind_driver(), soft_connect_store() and function_show() functions in drivers/usb/gadget/udc/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111545
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49944
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ucsi_unregister_connectors(), ucsi_init(), EXPORT_SYMBOL_GPL() and ucsi_unregister() functions in drivers/usb/typec/ucsi/ucsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111487
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49945
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the gpio_fan_set_cur_state() function in drivers/hwmon/gpio-fan.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111472
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49946
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the raspberrypi_discover_clocks() function in drivers/clk/bcm/clk-raspberrypi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111486
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49948
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the con_font_set() and con_font_default() functions in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111358
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49949
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the fw_upload_start() function in drivers/base/firmware_loader/sysfs_upload.c, within the fw_dev_release() function in drivers/base/firmware_loader/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111626
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49950
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the nft_set_elem_expr_clone() function in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111445
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49951
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the firmware_upload_unregister() function in drivers/base/firmware_loader/sysfs_upload.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111627
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49952
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the fastrpc_cb_probe() function in drivers/misc/fastrpc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111585
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49954
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __iforce_usb_xmit() and iforce_usb_out() functions in drivers/input/joystick/iforce/iforce-usb.c, within the iforce_serio_xmit() and iforce_serio_irq() functions in drivers/input/joystick/iforce/iforce-serio.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111514
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49956
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the r871x_internal_cmd_hdl() and cmd_hdl_filter() functions in drivers/staging/rtl8712/rtl8712_cmd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111586
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49957
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the kcm_attach() function in net/kcm/kcmsock.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111401
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49958
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dev_graft_qdisc(), attach_default_qdiscs() and dev_init_scheduler() functions in net/sched/sch_generic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111515
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49960
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tgl_get_bw_info() function in drivers/gpu/drm/i915/display/intel_bw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111516
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49962
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the xhci_plat_remove() function in drivers/usb/host/xhci-plat.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111698
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49963
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the emit_copy(), scatter_list_length() and intel_context_migrate_copy() functions in drivers/gpu/drm/i915/gt/intel_migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111665
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49964
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ci_leaf_init() and init_cache_level() functions in arch/arm64/kernel/cacheinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111414
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49965
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0_0_ppt.c, drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0_7_ppt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111412
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49966
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the drivers/gpu/drm/amd/pm/swsmu/smu11/sienna_cichlid_ppt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111446
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49968
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the r871x_internal_cmd_hdl() and cmd_hdl_filter() functions in drivers/staging/rtl8712/rtl8712_cmd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111624
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49969
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the optc1_enable_optc_clock() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_optc.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111411
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49971
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smu_v13_0_4_fini_smc_tables() function in drivers/gpu/drm/amd/pm/swsmu/smu13/smu_v13_0_4_ppt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111659
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49972
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the xp_check_dma_contiguity() and xp_dma_map() functions in net/xdp/xsk_buff_pool.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111519
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49977
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ftrace_startup() function in kernel/trace/ftrace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111606
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49978
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the fastrpc_cb_probe() function in drivers/misc/fastrpc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111528
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49980
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the usb_udc_uevent() function in drivers/usb/gadget/udc/core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111406
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49981
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the hidraw_release() function in drivers/hid/hidraw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111405
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49982
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the pvr2_hdw_create() function in drivers/media/usb/pvrusb2/pvrusb2-hdw.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111666
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49983
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the udmabuf_dev_init() function in drivers/dma-buf/udmabuf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111538
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49984
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the steam_recv_report() and steam_send_report() functions in drivers/hid/hid-steam.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111484
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49985
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the record_func_key() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111447
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49986
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the storvsc_probe() function in drivers/scsi/storvsc_drv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111697
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49987
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the md_stop() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111539
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49989
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lock_pages() and privcmd_ioctl_dm_op() functions in drivers/xen/privcmd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111448
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49990
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the arch_dup_task_struct() and copy_thread() functions in arch/s390/kernel/process.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111640
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49993
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the loop_set_status_from_info() function in drivers/block/loop.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111449
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49995
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the wb_inode_writeback_start() and wb_inode_writeback_end() functions in mm/page-writeback.c, within the wb_wakeup_delayed() and cgwb_remove_from_bdi_list() functions in mm/backing-dev.c, within the inode_io_list_move_locked(), wb_queue_work() and get_next_work_item() functions in fs/fs-writeback.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111529
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49999
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the btrfs_pin_extent_for_log_replay(), __exclude_logged_extent(), btrfs_block_group_done() and btrfs_trim_fs() functions in fs/btrfs/extent-tree.c, within the btrfs_wait_block_group_cache_progress(), btrfs_put_block_group(), btrfs_cache_block_group() and btrfs_update_block_group() functions in fs/btrfs/block-group.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111521
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50002
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mlx5_lag_add_netdev() function in drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111483
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50003
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ice_xsk_pool_setup() function in drivers/net/ethernet/intel/ice/ice_xsk.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111458
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50005
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pn532_uart_remove() function in drivers/nfc/pn533/uart.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111402
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50006
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __nfs42_ssc_open() function in fs/nfs/nfs4file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111589
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50008
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __disable_kprobe() function in kernel/kprobes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111637
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50010
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the i740fb_decode_var() function in drivers/video/fbdev/i740fb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111667
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50011
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the vcodec_domains_get() and core_get_v4() functions in drivers/media/platform/qcom/venus/pm_helpers.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111655
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50012
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the early_init_devtree() function in arch/powerpc/kernel/prom.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111540
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50015
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hda_dsp_ipc4_irq_thread() and hda_dsp_ipc_irq_thread() functions in sound/soc/sof/intel/hda-ipc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111541
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50016
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cnl_ipc4_irq_thread() and cnl_ipc_irq_thread() functions in sound/soc/sof/intel/cnl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111395
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50019
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the soc_info() function in drivers/tty/serial/ucc_uart.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111628
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50020
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ext4_resize_fs() function in fs/ext4/resize.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111596
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50021
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ext4_mb_clear_bb(), EXT4_C2B(), put_bh() and ext4_free_blocks() functions in fs/ext4/mballoc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111457
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50022
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the raid5_end_write_request() function in drivers/md/raid5.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111683
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50023
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the axi_chan_block_xfer_complete() function in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111543
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50024
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the dw_axi_dma_chan_slave_config() function in drivers/dma/dw-axi-dmac/dw-axi-dmac-platform.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111482
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50026
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the gaudi_parse_cb_no_ext_queue() function in drivers/misc/habanalabs/gaudi/gaudi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111393
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50027
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the lpfc_sli4_issue_wqe() function in drivers/scsi/lpfc/lpfc_sli.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111590
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50028
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the drivers/usb/gadget/legacy/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111688
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50029
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to failure to properly release resources within the drivers/clk/qcom/gcc-ipq8074.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111629
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50030
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the lpfc_debugfs_multixripools_write(), lpfc_debugfs_nvmestat_write(), lpfc_debugfs_ioktime_write(), lpfc_debugfs_nvmeio_trc_write() and lpfc_debugfs_hdwqstat_write() functions in drivers/scsi/lpfc/lpfc_debugfs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111456
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50031
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iscsi_iter_destroy_conn_fn() function in drivers/scsi/scsi_transport_iscsi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111374
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50032
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the usbhs_rza1_hardware_init() function in drivers/usb/renesas_usbhs/rza.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111376
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50033
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ohci_hcd_ppc_of_probe() function in drivers/usb/host/ohci-ppc-of.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111455
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50034
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cdns3_wa2_remove_old_request() function in drivers/usb/cdns3/gadget.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111454
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50035
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdgpu_cs_vm_handling() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111625
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50036
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the sun6i_dsi_setup_timings() function in drivers/gpu/drm/sun4i/sun6i_mipi_dsi.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111377
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50037
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the intel_context_migrate_copy() function in drivers/gpu/drm/i915/gt/intel_migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111379
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50038
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the meson_vpu_has_available_connectors() function in drivers/gpu/drm/meson/meson_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111684
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50039
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the intel_eth_pci_remove() function in drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111630
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50040
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the sja1105_setup_devlink_regions() function in drivers/net/dsa/sja1105/sja1105_devlink.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111656
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50041
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ice_reset_vf() function in drivers/net/ethernet/intel/ice/ice_vf_lib.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111648
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50044
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the qcom_mhi_qrtr_probe() function in net/qrtr/mhi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111591
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50045
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the set_pci_dma_ops(), get_phb_number() and pcibios_alloc_controller() functions in arch/powerpc/kernel/pci-common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111382
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50046
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rpc_sysfs_xprt_state_change() function in net/sunrpc/sysfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111511
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50047
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the mv88e6060_setup_port() function in drivers/net/dsa/mv88e6060.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111657
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50049
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the dpcm_get_be() function in sound/soc/soc-pcm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111631
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50050
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the hda_dsp_dump_ext_rom_status() function in sound/soc/sof/intel/hda.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111663
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50051
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the emit_copy(), scatter_list_length() and intel_context_migrate_copy() functions in drivers/gpu/drm/i915/gt/intel_migrate.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111632
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50052
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the memory_info_update() function in sound/soc/sof/debug.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111593
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50053
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111494
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50054
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the iavf_init_get_resources() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111384
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50055
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iavf_config_arq_regs(), iavf_init_asq() and iavf_init_arq() functions in drivers/net/ethernet/intel/iavf/iavf_adminq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111386
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50059
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the handle_cap_grant() function in fs/ceph/caps.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111373
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50060
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the npc_enadis_default_entries() and rvu_npc_enable_mcam_by_entry_index() functions in drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c, within the __rvu_flr_handler() function in drivers/net/ethernet/marvell/octeontx2/af/rvu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111352
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50061
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nmk_pinctrl_dt_subnode_to_map() function in drivers/pinctrl/nomadik/pinctrl-nomadik.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111614
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50062
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bgmac_dma_tx_add() function in drivers/net/ethernet/broadcom/bgmac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111353
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50065
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the receive_mergeable() function in drivers/net/virtio_net.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111481
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50066
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the aq_nic_service_timer_cb(), aq_nic_get_regs_count(), aq_nic_get_stats(), aq_nic_set_loopback() and aq_nic_stop() functions in drivers/net/ethernet/aquantia/atlantic/aq_nic.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111530
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50067
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the prepare_to_relocate() function in fs/btrfs/relocation.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111452
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50068
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ttm_bo_validate() function in drivers/gpu/drm/ttm/ttm_bo.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111443
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50072
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the _nfs4_open_and_get_state() function in fs/nfs/nfs4proc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111499
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50073
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tap_get_user() function in drivers/net/tap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111356
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50074
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the aa_simple_write_to_buffer() function in security/apparmor/apparmorfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111329
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50076
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cifs_close_deferred_file(), cifs_close_all_deferred_files() and cifs_close_deferred_file_under_dentry() functions in fs/cifs/misc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111327
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50077
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the aa_pivotroot() function in security/apparmor/mount.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111480
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50079
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dcn303_stream_encoder_create() function in drivers/gpu/drm/amd/display/dc/dcn303/dcn303_resource.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111451
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50083
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the fs/ext4/xattr.h. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111479
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50084
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the raid_status() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111641
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50085
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the attempt_restore_of_faulty_devices() function in drivers/md/dm-raid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111660
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50086
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the wbt_init() function in block/blk-wbt.c, within the blk_iolatency_init() function in block/blk-iolatency.c, within the blk_iocost_init() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111421
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50087
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the scpi_init_versions() and scpi_probe() functions in drivers/firmware/arm_scpi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111422
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50092
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the pool_ctr() function in drivers/md/dm-thin.c, within the dm_pool_register_metadata_threshold() function in drivers/md/dm-thin-metadata.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111695
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50093
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the dmar_parse_one_rhsa() function in drivers/iommu/intel/dmar.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111478
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50094
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the include/trace/events/spmi.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111531
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50095
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the begin_new_exec() function in fs/exec.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111694
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50097
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the s3fb_set_par() function in drivers/video/fbdev/s3fb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111579
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50098
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qla2xxx_eh_abort(), qla2x00_eh_wait_for_pending_commands(), qla2xxx_eh_device_reset() and qla2xxx_eh_target_reset() functions in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111693
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50099
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the arkfb_set_par() function in drivers/video/fbdev/arkfb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111578
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50100
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cpus_share_cache() and ttwu_queue_cond() functions in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111692
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50101
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the vt8623fb_set_par() function in drivers/video/fbdev/vt8623fb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111638
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50102
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error within the arkfb_set_par() function in drivers/video/fbdev/arkfb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111477
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50103
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the cpuset_cpumask_can_shrink() and task_can_attach() functions in kernel/sched/core.c, within the cpuset_can_attach() function in kernel/cgroup/cpuset.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111324
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50104
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xive_get_max_prio() function in arch/powerpc/sysdev/xive/spapr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111318
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50108
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the max77620_initialise_fps() function in drivers/mfd/max77620.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111317
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50109
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the clcdfb_of_init_display() function in drivers/video/fbdev/amba-clcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111316
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50110
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iounmap() function in drivers/watchdog/sp5100_tco.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111314
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50111
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mt6359_parse_dt() function in sound/soc/codecs/mt6359.c, within the mt6359_accdet_parse_dt() function in sound/soc/codecs/mt6359-accdet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111313
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50112
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qcom_smd_parse_edge() function in drivers/rpmsg/qcom_smd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111423
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50115
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sof_ipc3_control_load_bytes() function in sound/soc/sof/ipc3-topology.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111576
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50116
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the gsm_queue(), gsmld_output(), gsm_stuff_frame(), gsm_data_alloc(), gsm_is_flow_ctrl_msg(), __gsm_data_queue(), gsm_dlci_modem_output(), gsm_control_message(), gsm_control_wait(), gsm_dlci_close(), gsm_dlci_open(), gsm1_receive(), gsm_cleanup_mux(), gsm_activate_mux(), gsm_alloc_mux() and gsmld_open() functions in drivers/tty/n_gsm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111302
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50117
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the vfio_ioctl_device_feature_mig_device_state() and vfio_ioctl_device_feature_migration() functions in drivers/vfio/vfio.c, within the vfio_pci_core_register_device() function in drivers/vfio/pci/vfio_pci_core.c, within the mlx5vf_pci_close_device() and mlx5vf_pci_probe() functions in drivers/vfio/pci/mlx5/main.c, within the mlx5vf_cmd_remove_migratable() and mlx5vf_cmd_set_migratable() functions in drivers/vfio/pci/mlx5/cmd.c, within the hisi_acc_vfio_pci_open_device(), hisi_acc_vfio_pci_close_device() and hisi_acc_vfio_pci_probe() functions in drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111642
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50118
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the power_pmu_disable() function in arch/powerpc/perf/core-book3s.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111300
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50120
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the imx_rproc_addr_init() function in drivers/remoteproc/imx_rproc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111299
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50121
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the k3_r5_cluster_of_init() function in drivers/remoteproc/ti_k3_r5_remoteproc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111296
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50124
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mt6797_mt6351_dev_probe() function in sound/soc/mediatek/mt6797/mt6797-mt6351.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111295
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50125
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cros_ec_codec_platform_probe() function in sound/soc/codecs/cros_ec_codec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111609
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50126
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the jbd2_journal_dirty_metadata() function in fs/jbd2/transaction.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111575
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50127
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rxe_qp_init_misc(), rxe_qp_init_req() and rxe_qp_init_resp() functions in drivers/infiniband/sw/rxe/rxe_qp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111532
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50129
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the srpt_refresh_port(), srpt_cm_req_recv(), srpt_release_sport(), __srpt_lookup_wwn(), srpt_add_one(), srpt_wwn_to_sport_id() and srpt_make_tport() functions in drivers/infiniband/ulp/srpt/ib_srpt.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111633
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50131
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the mcp_smbus_write() function in drivers/hid/hid-mcp2221.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111503
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50132
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cdns3_gadget_ep_enable() and cdns3_gadget_ep_dequeue() functions in drivers/usb/cdns3/gadget.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111504
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50133
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the EXPORT_SYMBOL_GPL() function in drivers/usb/core/hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111294
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50134
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the setup_base_ctxt() function in drivers/infiniband/hw/hfi1/file_ops.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111505
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50135
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the rxe_qp_do_cleanup() function in drivers/infiniband/sw/rxe/rxe_qp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111615
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50136
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the siw_proc_mpareply() function in drivers/infiniband/sw/siw/siw_cm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111424
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50137
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the irdma_destroy_cq() function in drivers/infiniband/hw/irdma/verbs.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111293
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50138
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __qedr_alloc_mr() function in drivers/infiniband/hw/qedr/verbs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111274
Risk: Medium
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-50139
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ast_vhub_init_desc() function in drivers/usb/gadget/udc/aspeed-vhub/hub.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50140
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the msb_data_clear() function in drivers/memstick/core/ms_block.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111291
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50141
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the esdhc_signal_voltage_switch() function in drivers/mmc/host/sdhci-of-esdhc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111675
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50142
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the msc_buffer_set_uc(), __msc_buffer_win_free() and for_each_sg() functions in drivers/hwtracing/intel_th/msu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111290
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50143
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the intel_th_pci_probe() function in drivers/hwtracing/intel_th/pci.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111425
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50144
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sdw_do_port_prep() and sdw_notify_config() functions in drivers/soundwire/stream.c, within the sdw_slave_release() and sdw_slave_add() functions in drivers/soundwire/slave.c, within the sdw_drv_probe() and sdw_drv_remove() functions in drivers/soundwire/bus_type.c, within the sdw_slave_clk_stop_callback(), sdw_handle_slave_alerts() and sdw_update_slave_status() functions in drivers/soundwire/bus.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111506
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50145
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the to_sf_pdma_desc(), sf_pdma_prep_dma_memcpy(), sf_pdma_desc_residue(), sf_pdma_enable_request(), sf_pdma_issue_pending() and sf_pdma_donebh_tasklet() functions in drivers/dma/sf-pdma/sf-pdma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111289
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50146
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dw_pcie_ep_init() function in drivers/pci/controller/dwc/pcie-designware-ep.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111426
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50149
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __driver_attach_async_helper() and __driver_attach() functions in drivers/base/dd.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111427
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50151
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cdns3_allocate_trb_pool() function in drivers/usb/cdns3/cdns3-gadget.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111288
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50152
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ohci_hcd_nxp_probe() function in drivers/usb/host/ohci-nxp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111287
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50153
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ehci_hcd_ppc_of_probe() function in drivers/usb/host/ehci-ppc-of.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111286
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50154
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mtk_pcie_init_irq_domains() and irq_domain_remove() functions in drivers/pci/controller/pcie-mediatek-gen3.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111285
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50155
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm4908_partitions_fw_offset() function in drivers/mtd/parsers/ofpart_bcm4908.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111634
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50156
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the cp2112_xfer() function in drivers/hid/hid-cp2112.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111284
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50157
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mc_pcie_init_irq_domains() function in drivers/pci/controller/pcie-microchip-host.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111282
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50158
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the parse_redboot_of() function in drivers/mtd/parsers/redboot.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111279
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50160
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ap_flash_init() function in drivers/mtd/maps/physmap-versatile.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111277
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50161
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the of_flash_probe_versatile() function in drivers/mtd/maps/physmap-versatile.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111292
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50162
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the if_usb_probe() function in drivers/net/wireless/marvell/libertas/if_usb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111616
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50164
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the iwl_mvm_disable_sta_queues() function in drivers/net/wireless/intel/iwlwifi/mvm/sta.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111621
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50165
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the wil_write_file_wmi() function in drivers/net/wireless/ath/wil6210/debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111574
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50166
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the handle_cmd_cnt_and_timer() function in net/bluetooth/hci_event.c, within the hci_dev_do_reset() and hci_cmd_work() functions in net/bluetooth/hci_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111311
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50169
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the wil_write_file_wmi() function in drivers/net/wireless/ath/wil6210/debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111573
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50171
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sec_alloc_req_id(), sec_free_req_id(), sec_bd_send(), sec_create_qp_ctx() and sec_back_req_clear() functions in drivers/crypto/hisilicon/sec2/sec_crypto.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111320
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50172
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the __mt76x02u_mcu_send_msg() function in drivers/net/wireless/mediatek/mt76/mt76x02_usb_mcu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111571
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50173
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the mdp5_pipe_release() function in drivers/gpu/drm/msm/disp/mdp5/mdp5_pipe.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111357
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50175
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the tw686x_video_init() function in drivers/media/pci/tw686x/tw686x-video.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111330
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50176
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mcde_dsi_bind() function in drivers/gpu/drm/mcde/mcde_dsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111617
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50178
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the _dpk_pas_read() function in drivers/net/wireless/realtek/rtw89/rtw8852a_rfk.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111429
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50179
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ath9k_htc_probe_device() function in drivers/net/wireless/ath/ath9k/htc_drv_init.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111508
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50181
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the virtio_gpu_get_caps_ioctl() function in drivers/gpu/drm/virtio/virtgpu_ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111359
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50183
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the meson_encoder_cvbs_init() function in drivers/gpu/drm/meson/meson_encoder_cvbs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111360
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50184
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the meson_encoder_hdmi_init() function in drivers/gpu/drm/meson/meson_encoder_hdmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111635
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50185
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the ni_set_mc_special_registers() function in drivers/gpu/drm/radeon/ni_dpm.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111420
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50186
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ath11k_htc_tx_completion_handler() function in drivers/net/wireless/ath/ath11k/htc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111618
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50187
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the ath11k_core_pdev_create() function in drivers/net/wireless/ath/ath11k/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111361
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50188
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the meson_encoder_hdmi_init() function in drivers/gpu/drm/meson/meson_encoder_hdmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111431
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50190
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and devm_spi_unregister() functions in drivers/spi/spi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111363
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50191
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the of_get_regulation_constraints() function in drivers/regulator/of_regulator.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111432
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50192
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tegra_slink_remove() function in drivers/spi/spi-tegra20-slink.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111304
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50194
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qmp_cooling_devices_register() function in drivers/soc/qcom/qcom_aoss.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111364
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50196
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the of_get_ocmem() function in drivers/soc/qcom/ocmem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111365
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50197
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the zynq_get_revision() function in arch/arm/mach-zynq/common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111367
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50198
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the omap3xxx_prm_late_init() function in arch/arm/mach-omap2/prm3xxx.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111368
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50199
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the omapdss_init_of() function in arch/arm/mach-omap2/display.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111474
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50200
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the security/selinux/ss/policydb.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111369
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50201
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the security_read_policy() and security_read_state_kernel() functions in security/selinux/ss/services.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111567
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50202
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the snapshot_open(), snapshot_write() and snapshot_ioctl() functions in kernel/power/user.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111370
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50203
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the omapdss_init_fbdev() function in arch/arm/mach-omap2/display.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111371
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50204
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the pdata_quirks_init_clocks() function in arch/arm/mach-omap2/pdata-quirks.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111509
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50206
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the LIST_HEAD(), emulation_proc_handler() and register_insn_emulation_sysctl() functions in arch/arm64/kernel/armv8_deprecated.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111392
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50207
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the bcm_kona_smc_init() function in arch/arm/mach-bcm/bcm_kona_smc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111391
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50208
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the meson_secure_pwrc_probe() function in drivers/soc/amlogic/meson-secure-pwrc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111306
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50209
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the meson_mx_socinfo_init() function in drivers/soc/amlogic/meson-mx-socinfo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111433
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50211
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the raid10_remove_disk() function in drivers/md/raid10.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111434
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50212
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nft_chain_lookup_byid(), nf_tables_newrule() and nft_verdict_init() functions in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111435
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50213
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nft_set_lookup_byhandle(), nft_set_lookup_byid() and nft_set_lookup_global() functions in net/netfilter/nf_tables_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111534
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50215
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sg_link_reserve(), sg_read(), sg_ioctl_common(), sg_unlink_reserve() and sg_remove_request() functions in drivers/scsi/sg.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111510
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50218
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the isl29028_probe() function in drivers/iio/light/isl29028.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111440
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50220
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drivers/net/usb/usbnet.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50221
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the drm_fb_helper_damage() and drm_fb_helper_memory_range_to_clip() functions in drivers/gpu/drm/drm_fb_helper.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111680
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50222
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the vc_uniscr_alloc() function in drivers/tty/vt/vt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111305
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50226
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the sev_ioctl_do_platform_status(), sev_ioctl_do_pek_csr(), sev_ioctl_do_get_id2() and sev_ioctl_do_pdh_export() functions in drivers/crypto/ccp/sev-dev.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111619
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50228
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the svm_set_irq() function in arch/x86/kvm/svm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111441
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50229
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bcd2000_init_midi() function in sound/usb/bcd2000/bcd2000.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111442
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50231
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the neon_poly1305_blocks() function in arch/arm64/crypto/poly1305-glue.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77911
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3111
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the prepare_to_relocate() function in fs/btrfs/relocation.c in btrfs in the Linux Kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103660
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52924
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the nft_rbtree_walk() function in net/netfilter/nft_set_rbtree.c, within the nft_rhash_walk() function in net/netfilter/nft_set_hash.c, within the nf_tables_dump_setelem() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103661
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52925
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the nft_pipapo_get(), nft_pipapo_activate() and nft_pipapo_remove() functions in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108438
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53046
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hci_cmd_sync_clear() function in net/bluetooth/hci_sync.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108502
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53048
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tcpm_ams_start() and vdm_run_state_machine() functions in drivers/usb/typec/tcpm/tcpm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108494
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53076
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the replace_barrier() and i915_active_add_request() functions in drivers/gpu/drm/i915/i915_active.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108399
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53097
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the iommu_debugfs_add() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93809
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26808
CWE-ID:
CWE-825 - Expired pointer dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a stale reference within the nf_tables_netdev_event() function in net/netfilter/nft_chain_filter.c. A local user can perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89055
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26924
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the nft_pipapo_remove() function in net/netfilter/nft_set_pipapo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91358
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26935
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the scsi_host_dev_release() function in drivers/scsi/hosts.c. A local user can gain access to sensitive information.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92027
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27397
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __nft_rbtree_insert(), nft_rbtree_deactivate() and nft_rbtree_gc() functions in net/netfilter/nft_set_rbtree.c, within the pipapo_get(), nft_pipapo_get(), nft_pipapo_insert(), pipapo_gc() and pipapo_deactivate() functions in net/netfilter/nft_set_pipapo.c, within the nft_rhash_key(), nft_rhash_cmp(), nft_rhash_lookup(), nft_rhash_get(), nft_rhash_update(), nft_rhash_insert() and nft_rhash_deactivate() functions in net/netfilter/nft_set_hash.c, within the nft_trans_gc_catchall_sync() and nf_tables_valid_genid() functions in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93429
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35840
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the subflow_finish_connect() function in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92332
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36978
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the multiq_tune() function in net/sched/sch_multiq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97501
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-46800
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_enqueue() function in net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101233
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53125
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the find_equal_scalars() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101348
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-53141
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bitmap_ip_uadt() function in net/netfilter/ipset/ip_set_bitmap_ip.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102090
Risk: High
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]
CVE-ID: CVE-2024-53197
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the affected system.
The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited against Android devices.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU102490
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56770
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tfifo_reset(), tfifo_enqueue(), netem_enqueue() and netem_dequeue() functions in net/sched/sch_netem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU105029
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-57999
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the enable_ddw() and spapr_tce_create_table() functions in arch/powerpc/platforms/pseries/iommu.c, within the iommu_table_clear() function in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103959
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21700
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104074
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21702
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104073
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-21703
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU104945
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2025-21756
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the EXPORT_SYMBOL_GPL() and __vsock_release() functions in net/vmw_vsock/af_vsock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU108317
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23141
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the kvm_arch_vcpu_ioctl_get_mpstate() function in arch/x86/kvm/x86.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108299
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-23145
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the subflow_hmac_valid() and subflow_syn_recv_sock() functions in net/mptcp/subflow.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108259
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37752
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the sfq_change() function in net/sched/sch_sfq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108390
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37798
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qdisc_bstats_update() function in net/sched/sch_fq_codel.c, within the codel_qdisc_dequeue() function in net/sched/sch_codel.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU108825
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37823
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the hfsc_dequeue() function in net/sched/sch_hfsc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109282
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37890
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfsc_enqueue() function in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109572
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37932
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the htb_qlen_notify() function in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109581
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37948
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the pr_fmt(), build_plt(), build_epilogue() and bpf_int_jit_compile() functions in arch/arm64/net/bpf_jit_comp.c, within the this_cpu_set_vectors() function in arch/arm64/kernel/proton-pack.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109526
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37953
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the htb_add_to_wait_tree(), htb_activate(), htb_qlen_notify(), htb_delete() and htb_change_class() functions in net/sched/sch_htb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109582
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37963
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the build_bhb_mitigation() function in arch/arm64/net/bpf_jit_comp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU109954
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37997
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the net/netfilter/ipset/ip_set_hash_gen.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110683
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38000
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfsc_enqueue() function in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU110681
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2025-38001
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cl_in_el_or_vttree(), hfsc_change_class() and hfsc_enqueue() functions in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU111704
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38014
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the f2fs_new_node_page() function in fs/f2fs/node.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111643
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38060
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the copy_verifier_state() function in kernel/bpf/verifier.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU111647
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38083
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the prio_tune() function in net/sched/sch_prio.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.5
SUSE Linux Enterprise Live Patching: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP5
SUSE Linux Enterprise Server 15: SP5
SUSE Linux Enterprise Real Time 15: SP5
SUSE Linux Enterprise High Performance Computing 15: SP5
kernel-livepatch-5_14_21-150500_55_113-default: before 1-150500.11.3.1
kernel-default-livepatch: before 5.14.21-150500.55.113.1
kernel-default-livepatch-devel: before 5.14.21-150500.55.113.1
kernel-default-debugsource: before 5.14.21-150500.55.113.1
kernel-default-debuginfo: before 5.14.21-150500.55.113.1
kernel-livepatch-SLE15-SP5_Update_28-debugsource: before 1-150500.11.3.1
kernel-livepatch-5_14_21-150500_55_113-default-debuginfo: before 1-150500.11.3.1
kernel-default: before 5.14.21-150500.55.113.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20252264-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.