| Risk | Medium |
| Patch available | YES |
| Number of vulnerabilities | 137 |
| CVE-ID | CVE-2021-4460 CVE-2022-43945 CVE-2022-48631 CVE-2022-50236 CVE-2022-50249 CVE-2022-50280 CVE-2022-50293 CVE-2022-50327 CVE-2022-50350 CVE-2022-50356 CVE-2022-50367 CVE-2022-50394 CVE-2022-50395 CVE-2022-50423 CVE-2022-50443 CVE-2022-50459 CVE-2022-50470 CVE-2022-50481 CVE-2022-50485 CVE-2022-50487 CVE-2022-50493 CVE-2022-50496 CVE-2022-50501 CVE-2022-50504 CVE-2022-50505 CVE-2022-50509 CVE-2022-50516 CVE-2022-50532 CVE-2022-50534 CVE-2022-50536 CVE-2022-50537 CVE-2022-50542 CVE-2022-50544 CVE-2022-50549 CVE-2022-50563 CVE-2022-50564 CVE-2022-50571 CVE-2022-50581 CVE-2023-53183 CVE-2023-53185 CVE-2023-53188 CVE-2023-53191 CVE-2023-53204 CVE-2023-53271 CVE-2023-53282 CVE-2023-53289 CVE-2023-53292 CVE-2023-53338 CVE-2023-53339 CVE-2023-53373 CVE-2023-53433 CVE-2023-53476 CVE-2023-53477 CVE-2023-53484 CVE-2023-53517 CVE-2023-53519 CVE-2023-53533 CVE-2023-53540 CVE-2023-53548 CVE-2023-53556 CVE-2023-53559 CVE-2023-53564 CVE-2023-53568 CVE-2023-53582 CVE-2023-53587 CVE-2023-53589 CVE-2023-53593 CVE-2023-53594 CVE-2023-53596 CVE-2023-53603 CVE-2023-53604 CVE-2023-53611 CVE-2023-53615 CVE-2023-53619 CVE-2023-53620 CVE-2023-53622 CVE-2023-53624 CVE-2023-53635 CVE-2023-53644 CVE-2023-53647 CVE-2023-53648 CVE-2023-53650 CVE-2023-53667 CVE-2023-53668 CVE-2023-53672 CVE-2023-53675 CVE-2023-53681 CVE-2023-53683 CVE-2023-53687 CVE-2023-53695 CVE-2023-53696 CVE-2023-53705 CVE-2023-53707 CVE-2023-53715 CVE-2023-53717 CVE-2023-53722 CVE-2023-53733 CVE-2023-7324 CVE-2024-56633 CVE-2025-38539 CVE-2025-38680 CVE-2025-38691 CVE-2025-38695 CVE-2025-38699 CVE-2025-38700 CVE-2025-38714 CVE-2025-38718 CVE-2025-38724 CVE-2025-39676 CVE-2025-39702 CVE-2025-39724 CVE-2025-39756 CVE-2025-39772 CVE-2025-39812 CVE-2025-39813 CVE-2025-39841 CVE-2025-39866 CVE-2025-39876 CVE-2025-39911 CVE-2025-39923 CVE-2025-39929 CVE-2025-39931 CVE-2025-39945 CVE-2025-39949 CVE-2025-39955 CVE-2025-39968 CVE-2025-39970 CVE-2025-39971 CVE-2025-39972 CVE-2025-39973 CVE-2025-39997 CVE-2025-40018 CVE-2025-40044 CVE-2025-40049 CVE-2025-40078 CVE-2025-40082 CVE-2025-40088 |
| CWE-ID | CWE-682 CWE-119 CWE-667 CWE-665 CWE-401 CWE-476 CWE-416 CWE-125 CWE-404 CWE-20 CWE-399 CWE-617 CWE-835 CWE-388 CWE-362 CWE-908 |
| Exploitation vector | Network |
| Public exploit | N/A |
| Vulnerable software |
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system kernel-default-kgraft-devel Operating systems & Components / Operating system package or component kernel-default-kgraft Operating systems & Components / Operating system package or component kgraft-patch-4_12_14-122_280-default Operating systems & Components / Operating system package or component kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component kernel-default-man Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component kernel-default-base-debuginfo Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component |
| Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 137 vulnerabilities.
EUVDB-ID: #VU116299
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4460
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the set_sched_resources() and initialize_cpsch() functions in drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU69766
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-43945
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attacl.
The vulnerability exists due to a boundary error within the Linux kernel NFSD implementation. A remote attacker can send the RPC message over TCP with garbage data added at the end of the message, trigger memory corruption and perform a denial of service (DoS) attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92033
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48631
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __ext4_ext_check() function in fs/ext4/extents.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115560
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50236
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the mtk_iommu_isr() function in drivers/iommu/mtk_iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115353
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50249
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the of_get_ddr_timings() function in drivers/memory/of_memory.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115443
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50280
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the propagate_one() function in fs/pnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115594
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50293
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the btrfs_drop_extents() function in fs/btrfs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115438
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50327
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the acpi_processor_get_lpi_info() function in drivers/acpi/processor_idle.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115690
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50350
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the iscsi_target_handle_csg_one() and iscsi_target_start_negotiation() functions in drivers/target/iscsi/iscsi_target_nego.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115800
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50356
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the sfb_reset() function in net/sched/sch_sfb.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115780
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50367
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the inode_init_always() function in fs/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115909
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50394
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ismt_access() function in drivers/i2c/busses/i2c-ismt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115873
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50395
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the integrity_init_keyring() function in security/integrity/digsig.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116340
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50423
CWE-ID:
CWE-404 - Improper Resource Shutdown or Release
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to failure to properly release resources within the acpi_ut_copy_ipackage_to_ipackage() function in drivers/acpi/acpica/utcopy.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116294
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50443
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the rk3288_lvds_poweron() and px30_lvds_poweron() functions in drivers/gpu/drm/rockchip/rockchip_lvds.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116288
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50459
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the drivers/scsi/iscsi_tcp.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116569
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50470
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the xhci_free_virt_device() function in drivers/usb/host/xhci-mem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50481
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the cxl_guest_init_afu() and cxl_guest_init_adapter() functions in drivers/misc/cxl/guest.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116568
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50485
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the swap_inode_boot_loader() function in fs/ext4/ioctl.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116580
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50487
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the nfsd3_init_dirlist_pages() function in fs/nfsd/nfs3proc.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116566
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50493
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the qla24xx_abort_iocb_timeout() function in drivers/scsi/qla2xxx/qla_init.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116519
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50496
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the destroy() function in drivers/md/dm-cache-target.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116546
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50501
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the coda_setup_iram() function in drivers/media/platform/chips-media/coda-bit.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116583
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50504
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the rtas_os_term() function in arch/powerpc/kernel/rtas.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116495
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50505
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ppr_notifier() function in drivers/iommu/amd/iommu_v2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116794
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50509
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the coda_start_encoding() function in drivers/media/platform/chips-media/coda-bit.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116760
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50516
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the send_args() function in fs/dlm/lock.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116715
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50532
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mpt3sas_transport_port_add() function in drivers/scsi/mpt3sas/mpt3sas_transport.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116805
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50534
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __open_metadata() function in drivers/md/dm-thin-metadata.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116758
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50536
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tcp_bpf_send_verdict() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116714
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50537
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rpi_firmware_probe() function in drivers/firmware/raspberrypi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116757
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50542
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the si470x_usb_driver_probe() function in drivers/media/radio/si470x/radio-si470x-usb.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116708
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50544
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the xhci_alloc_stream_info() function in drivers/usb/host/xhci-mem.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116804
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50549
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __create_persistent_data_objects(), dm_pool_metadata_close() and __set_abort_with_changes_flags() functions in drivers/md/dm-thin-metadata.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117571
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50563
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __pool_destroy() function in drivers/md/dm-thin.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117605
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50564
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization within the netiucv_close() function in drivers/s390/net/netiucv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117596
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50571
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the bitmap_clear_bits(), __load_free_space_cache(), load_free_space_cache() and __btrfs_return_cluster_to_free_space() functions in fs/btrfs/free-space-cache.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117582
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-50581
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hfs_write_inode() function in fs/hfs/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115507
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53183
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the prepare_to_merge() and merge_reloc_roots() functions in fs/btrfs/relocation.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115653
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53185
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the htc_process_conn_rsp() function in drivers/net/wireless/ath/ath9k/htc_hst.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115551
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53188
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the do_output() function in net/openvswitch/actions.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115340
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53191
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the alpine_msix_init_domains() function in drivers/irqchip/irq-alpine-msi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115471
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53204
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the unix_inflight(), unix_notinflight() and too_many_unix_fds() functions in net/unix/scm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115593
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53271
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the ubi_resize_volume() function in drivers/mtd/ubi/vmt.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115604
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53282
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the lpfc_wr_object() function in drivers/scsi/lpfc/lpfc_sli.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115648
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53289
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the bdisp_probe() function in drivers/media/platform/st/sti/bdisp/bdisp-v4l2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115649
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53292
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the blk_mq_elv_switch_none() function in block/blk-mq.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115779
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53338
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the run_lwt_bpf() and bpf_lwt_xmit_reroute() functions in net/core/lwt_bpf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115811
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53339
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the btrfs_cancel_balance() function in fs/btrfs/volumes.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115898
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53373
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the seqiv_aead_encrypt_complete2() function in crypto/seqiv.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115937
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53433
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the packet_parse_headers() function in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116379
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53476
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the c4iw_fill_res_cm_id_entry() function in drivers/infiniband/hw/cxgb4/restrack.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116372
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53477
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the rt6_nlmsg_size() function in net/ipv6/route.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116284
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53484
CWE-ID:
CWE-682 - Incorrect Calculation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect calculation within the free_irq_cpu_rmap(), irq_cpu_rmap_release() and irq_cpu_rmap_add() functions in lib/cpu_rmap.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116263
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53517
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the tipc_link_proto_rcv() function in net/tipc/link.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116362
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53519
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the include/media/v4l2-mem2mem.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116494
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53533
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the rpi_ts_probe() function in drivers/input/touchscreen/raspberrypi-ts.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116598
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53540
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the cfg80211_mlme_auth() and cfg80211_mlme_assoc() functions in net/wireless/mlme.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116591
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53548
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the function in drivers/net/usb/usbnet.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116513
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53556
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iavf_alloc_q_vectors() function in drivers/net/ethernet/intel/iavf/iavf_main.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116512
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53559
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vti_tunnel_xmit() function in net/ipv4/ip_vti.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116570
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53564
CWE-ID:
CWE-617 - Reachable Assertion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the __ocfs2_move_extent() function in fs/ocfs2/move_extents.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116490
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53568
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the zcdn_create() function in drivers/s390/crypto/zcrypt_api.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116524
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53582
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the brcmf_c_preinit_dcmds() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116508
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53587
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rb_free_cpu_buffer() and ring_buffer_free() functions in kernel/trace/ring_buffer.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116565
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53589
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the iwl_mvm_update_mcc() function in drivers/net/wireless/intel/iwlwifi/mvm/nvm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116485
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53593
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the cifs_readpage_worker() function in fs/cifs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116484
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53594
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the device_add() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116483
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53596
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the device_del() function in drivers/base/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116532
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53603
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla24xx_issue_sa_replace_iocb() function in drivers/scsi/qla2xxx/qla_edif.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116480
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53604
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the dm_integrity_init() function in drivers/md/dm-integrity.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116476
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53611
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the try_smi_init() function in drivers/char/ipmi/ipmi_si_intf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116550
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53615
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the qlt_free_session_done() and qlt_unreg_sess() functions in drivers/scsi/qla2xxx/qla_target.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116754
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53619
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nf_conntrack_helper_register() and nf_conntrack_helper_fini() functions in net/netfilter/nf_conntrack_helper.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116803
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53620
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the status_resync() function in drivers/md/md.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116802
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53622
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the gfs2_show_options() function in fs/gfs2/super.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116800
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53624
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the function in tools/testing/selftests/tc-testing/tc-tests/qdiscs/fq.json. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116826
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53635
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ctnetlink_dump_status() and ctnetlink_create_conntrack() functions in net/netfilter/nf_conntrack_netlink.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116798
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53644
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the usb_shark_probe() function in drivers/media/radio/radio-shark2.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116780
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53647
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the vmbus_acpi_add() function in drivers/hv/vmbus_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116779
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53648
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the snd_ac97_mixer() function in sound/pci/ac97/ac97_codec.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116696
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53650
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the mipid_spi_probe() function in drivers/video/fbdev/omap/lcd_mipid.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116797
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53667
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cdc_ncm_check_tx_max() and cdc_ncm_fill_tx_frame() functions in drivers/net/usb/cdc_ncm.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116796
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53668
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ring_buffer_size() function in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116825
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53672
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the lookup_inline_extent_backref() function in fs/btrfs/extent-tree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116763
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53675
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ses_enclosure_data_process() function in drivers/scsi/ses.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116772
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53681
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __bch_btree_node_alloc() function in drivers/md/bcache/btree.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116814
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53683
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the hfsplus_cat_read_inode() and hfsplus_cat_write_inode() functions in fs/hfsplus/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116687
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53687
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the s3c24xx_serial_getclk() function in drivers/tty/serial/samsung.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117617
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53695
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the __udf_iget() function in fs/udf/inode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117553
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53696
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the qla2x00_probe_one() function in drivers/scsi/qla2xxx/qla_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117580
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53705
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ipv6_find_tlv() function in net/ipv6/exthdrs_core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117599
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53707
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the amdgpu_cs_pass1() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117548
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53715
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the brcmf_map_fw_linkdown_reason() function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117578
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53717
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117579
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53722
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the raid1_remove_disk() function in drivers/md/raid1.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117661
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53733
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the u32_set_parms() and u32_change() functions in net/sched/cls_u32.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117795
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-7324
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the ses_match_host(), ses_process_descriptor() and ses_enclosure_data_process() functions in drivers/scsi/ses.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU102025
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-56633
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sock_put() function in net/ipv4/tcp_bpf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114155
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38539
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the __register_event() and __trace_add_event_dirs() functions in kernel/trace/trace_events.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114816
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38680
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the uvc_parse_format() function in drivers/media/usb/uvc/uvc_driver.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114803
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38691
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ext_tree_encode_commit(), ext_tree_prepare_commit() and dprintk() functions in fs/nfs/blocklayout/extent_tree.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114827
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38695
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the lpfc_sli4_vport_delete_fcp_xri_aborted() function in drivers/scsi/lpfc/lpfc_scsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114802
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38699
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the bfad_im_probe() function in drivers/scsi/bfa/bfad_im.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114823
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38700
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the iscsi_conn_setup() function in drivers/scsi/libiscsi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114811
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38714
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the is_bnode_offset_valid(), hfs_bnode_write(), hfs_bnode_clear(), hfs_bnode_copy() and hfs_bnode_move() functions in fs/hfsplus/bnode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114833
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38718
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the sctp_rcv() function in net/sctp/input.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114799
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-38724
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nfsd4_setclientid_confirm() function in fs/nfsd/nfs4state.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114933
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39676
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the qla4xxx_get_ep_fwdb() function in drivers/scsi/qla4xxx/ql4_os.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114962
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39702
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the seg6_hmac_validate_skb() function in net/ipv6/seg6_hmac.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU114949
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39724
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the serial8250_do_startup() function in drivers/tty/serial/8250/8250_port.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115586
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39756
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the alloc_fdtable() function in fs/file.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115460
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39772
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the hibmc_load() function in drivers/gpu/drm/hisilicon/hibmc/hibmc_drm_drv.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115643
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39812
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the sctp_v6_from_sk() function in net/sctp/ipv6.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115599
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39813
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the ftrace_dump() function in kernel/trace/trace.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115979
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39841
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the lpfc_nvmet_defer_rcv() function in drivers/scsi/lpfc/lpfc_nvmet.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU115974
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39866
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __mark_inode_dirty() function in fs/fs-writeback.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116045
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39876
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the fec_enet_phy_reset_after_clk_enable() function in drivers/net/ethernet/freescale/fec_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116248
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39911
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the i40e_vsi_request_irq_msix() function in drivers/net/ethernet/intel/i40e/i40e_main.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116244
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39923
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the bam_dma_probe() function in drivers/dma/qcom/bam_dma.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116455
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39929
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smbd_negotiate() function in fs/smb/client/smbdirect.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116473
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39931
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the af_alg_sendmsg() function in crypto/af_alg.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116459
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39945
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the cnic_cm_stop_bnx2x_hw() function in drivers/net/ethernet/broadcom/cnic.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116469
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39949
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the qed_protection_override_dump() function in drivers/net/ethernet/qlogic/qed/qed_debug.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU116879
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39955
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the tcp_disconnect() function in net/ipv4/tcp.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117288
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39968
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the i40e_vc_del_cloud_filter() and i40e_vc_add_cloud_filter() functions in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117267
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39970
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the i40e_validate_cloud_filter() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117276
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39971
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i40e_vc_config_queues_msg() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117277
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39972
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i40e_validate_queue_map() function in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117274
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39973
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the i40e_config_vsi_tx_queue() and i40e_config_vsi_rx_queue() functions in drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117254
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-39997
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the snd_usbmidi_free() function in sound/usb/midi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117654
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40018
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the __ip_vs_ftp_exit() and ip_vs_ftp_init() functions in net/netfilter/ipvs/ip_vs_ftp.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117723
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40044
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the udf_current_aext() function in fs/udf/inode.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117753
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40049
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the fs/squashfs/squashfs_fs_i.h. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117761
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40078
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the sock_addr_is_valid_access() function in net/core/filter.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117726
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40082
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hfsplus_listxattr() function in fs/hfsplus/xattr.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU117848
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-40088
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the hfsplus_strcasecmp() and hfsplus_strcmp() functions in fs/hfsplus/unicode.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
SUSE Linux Enterprise Live Patching: 12-SP5
kernel-default-kgraft-devel: before 4.12.14-122.280.1
kernel-default-kgraft: before 4.12.14-122.280.1
kgraft-patch-4_12_14-122_280-default: before 1-8.5.1
kernel-default-devel-debuginfo: before 4.12.14-122.280.1
kernel-default-man: before 4.12.14-122.280.1
kernel-macros: before 4.12.14-122.280.1
kernel-devel: before 4.12.14-122.280.1
kernel-source: before 4.12.14-122.280.1
kernel-default: before 4.12.14-122.280.1
kernel-default-base-debuginfo: before 4.12.14-122.280.1
kernel-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-devel: before 4.12.14-122.280.1
cluster-md-kmp-default: before 4.12.14-122.280.1
dlm-kmp-default: before 4.12.14-122.280.1
cluster-md-kmp-default-debuginfo: before 4.12.14-122.280.1
dlm-kmp-default-debuginfo: before 4.12.14-122.280.1
ocfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
kernel-default-debugsource: before 4.12.14-122.280.1
gfs2-kmp-default: before 4.12.14-122.280.1
kernel-default-base: before 4.12.14-122.280.1
kernel-syms: before 4.12.14-122.280.1
gfs2-kmp-default-debuginfo: before 4.12.14-122.280.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20254189-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.