Risk | High |
Patch available | YES |
Number of vulnerabilities | 37 |
CVE-ID | CVE-2020-10135 CVE-2021-43389 CVE-2021-4439 CVE-2021-47247 CVE-2021-47311 CVE-2021-47328 CVE-2021-47368 CVE-2021-47372 CVE-2021-47379 CVE-2021-47571 CVE-2021-47583 CVE-2022-0435 CVE-2022-22942 CVE-2022-2938 CVE-2022-48711 CVE-2022-48760 CVE-2022-48771 CVE-2023-24023 CVE-2023-52707 CVE-2023-52752 CVE-2023-52881 CVE-2024-26921 CVE-2024-26923 CVE-2024-35789 CVE-2024-35861 CVE-2024-35862 CVE-2024-35864 CVE-2024-35878 CVE-2024-35950 CVE-2024-36894 CVE-2024-36904 CVE-2024-36940 CVE-2024-36964 CVE-2024-38541 CVE-2024-38545 CVE-2024-38559 CVE-2024-38560 |
CWE-ID | CWE-300 CWE-129 CWE-125 CWE-416 CWE-399 CWE-908 CWE-121 CWE-264 CWE-20 CWE-119 CWE-347 CWE-451 CWE-191 CWE-667 CWE-476 CWE-415 CWE-269 |
Exploitation vector | Network |
Public exploit |
Vulnerability #13 is being exploited in the wild. Public exploit code for vulnerability #18 is available. |
Vulnerable software |
SUSE Linux Enterprise Live Patching Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP2 Business Critical Linux Operating systems & Components / Operating system SUSE Linux Enterprise High Availability Extension 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP2 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system reiserfs-kmp-default-debuginfo Operating systems & Components / Operating system package or component reiserfs-kmp-default Operating systems & Components / Operating system package or component kernel-docs Operating systems & Components / Operating system package or component kernel-devel Operating systems & Components / Operating system package or component kernel-source Operating systems & Components / Operating system package or component kernel-macros Operating systems & Components / Operating system package or component kernel-preempt-debugsource Operating systems & Components / Operating system package or component kernel-default-base Operating systems & Components / Operating system package or component kernel-default-devel-debuginfo Operating systems & Components / Operating system package or component kernel-obs-build-debugsource Operating systems & Components / Operating system package or component kernel-preempt-devel-debuginfo Operating systems & Components / Operating system package or component kernel-obs-build Operating systems & Components / Operating system package or component kernel-preempt-debuginfo Operating systems & Components / Operating system package or component kernel-syms Operating systems & Components / Operating system package or component kernel-preempt-devel Operating systems & Components / Operating system package or component kernel-default-devel Operating systems & Components / Operating system package or component kernel-preempt Operating systems & Components / Operating system package or component dlm-kmp-default-debuginfo Operating systems & Components / Operating system package or component gfs2-kmp-default Operating systems & Components / Operating system package or component gfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component cluster-md-kmp-default-debuginfo Operating systems & Components / Operating system package or component dlm-kmp-default Operating systems & Components / Operating system package or component ocfs2-kmp-default-debuginfo Operating systems & Components / Operating system package or component ocfs2-kmp-default Operating systems & Components / Operating system package or component cluster-md-kmp-default Operating systems & Components / Operating system package or component kernel-default-livepatch-devel Operating systems & Components / Operating system package or component kernel-livepatch-5_3_18-150200_24_197-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-livepatch Operating systems & Components / Operating system package or component kernel-default-debuginfo Operating systems & Components / Operating system package or component kernel-default-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-SLE15-SP2_Update_50-debugsource Operating systems & Components / Operating system package or component kernel-livepatch-5_3_18-150200_24_197-default Operating systems & Components / Operating system package or component kernel-default Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 37 vulnerabilities.
EUVDB-ID: #VU28001
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-10135
CWE-ID:
CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a Man-in-the-Middle (MitM) attack.
The vulnerability exists in the implementation of Bluetooth v5.0, v4.2, v4.1, v4.0 on devices manufactured by multiple vendors. A remote attacker with physical proximity to the victim can successful perform a MitM attack even against previously paired devices and gain access to sensitive information.
Below is the list of chips and devices, confirmed to be vulnerable:
Chip | Device |
Bluetooth v5.0 | |
Apple 339S00397 | iPhone 8 |
CYW20819 | CYW920819EVB-02 |
Intel 9560 | ThinkPad L390 |
Snapdragon 630 | Nokia 7 |
Snapdragon 636 | Nokia X6 |
Snapdragon 835 | Pixel 2 |
Snapdragon 845 | Pixel 3, OnePlus 6 |
Bluetooth v4.2 | |
Apple 339S00056 | MacBookPro 2017 |
Apple 339S00199 | iPhone 7plus |
Apple 339S00448 | iPad 2018 |
CSR 11393 | Sennheiser PXC 550 |
Exynos 7570 | Galaxy J3 2017 |
Intel 7265 | ThinkPad X1 3rd |
Intel 8260 | HP ProBook 430 G3 |
Bluetooth v4.1 | |
CYW4334 | iPhone 5s |
CYW4339 | Nexus 5, iPhone 6 |
CYW43438 | RPi 3B+ |
Snapdragon 210 | LG K4 |
Snapdragon 410 | Motorola G3, Galaxy J5 |
Bluetooth <= v4.0 | |
BCM20730 | ThinkPad 41U5008 |
BCM4329B1 | iPad MC349LL |
CSR 6530 | PLT BB903+ |
CSR 8648 | Philips SHB7250 |
Exynos 3470 | Galaxy S5 mini |
Exynos 3475 | Galaxy J3 2016 |
Intel 1280 | Lenovo U430 |
Intel 6205 | ThinkPad X230 |
Snapdragon 200 | Lumia 530 |
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63385
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-43389
CWE-ID:
CWE-129 - Improper Validation of Array Index
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code with elevated privileges.
The vulnerability exists due to improper validation of array index in the ISDN CAPI implementation within detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. A local user can send specially crafted data to the system and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92900
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-4439
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the detach_capi_ctr() function in drivers/isdn/capi/kcapi.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90090
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47247
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the mlx5e_take_all_route_decap_flows() and mlx5e_encap_valid() functions in drivers/net/ethernet/mellanox/mlx5/core/en/tc_tun_encap.c, within the wait_for_completion() and mlx5e_take_all_encap_flows() functions in drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c, within the mlx5e_rep_neigh_update() and mlx5e_rep_update_flows() functions in drivers/net/ethernet/mellanox/mlx5/core/en/rep/neigh.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90103
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47311
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the emac_remove() function in drivers/net/ethernet/qualcomm/emac/emac.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91060
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47328
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the iscsi_prep_bidi_ahs(), iscsi_check_tmf_restrictions(), iscsi_data_in_rsp(), EXPORT_SYMBOL_GPL(), iscsi_exec_task_mgmt_fn(), iscsi_eh_abort(), iscsi_eh_device_reset(), iscsi_session_recovery_timedout(), iscsi_conn_failure(), iscsi_eh_target_reset(), iscsi_session_setup(), iscsi_conn_setup(), iscsi_conn_teardown(), iscsi_conn_start() and iscsi_start_session_recovery() functions in drivers/scsi/libiscsi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93188
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47368
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the enetc_clear_bdrs() and enetc_setup_irqs() functions in drivers/net/ethernet/freescale/enetc/enetc.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90136
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47372
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the macb_remove() function in drivers/net/ethernet/cadence/macb_pci.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90139
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47379
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the spin_lock_irq() and blkcg_deactivate_policy() functions in block/blk-cgroup.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91051
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47571
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the _rtl92e_pci_disconnect() function in drivers/staging/rtl8192e/rtl8192e/rtl_core.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92933
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-47583
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the mxl111sf_init() and mxl111sf_get_stream_config_dvbt() functions in drivers/media/usb/dvb-usb-v2/mxl111sf.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61216
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-0435
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Linux kernel networking module for the Transparent Inter-Process Communication (TIPC) protocol. A remote unauthenticated attacker can send specially crafted traffic to the system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the TIPC bearer is set up.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU61217
Risk: Low
CVSSv4.0: 8.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear]
CVE-ID: CVE-2022-22942
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an error in the vmwgfx driver in Linux kernel. A local unprivileged user can gain access to files opened by other processes on the system through a dangling 'file' pointer.
Exploiting this vulnerability requires an attacker to have access to either /dev/dri/card0 or /dev/dri/rendererD128 and be able to issue an ioctl() on the resulting file descriptor.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU67513
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-2938
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in Linux kernel implementation of Pressure Stall Information. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92925
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48711
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the tipc_mon_rcv() function in net/tipc/monitor.c, within the tipc_link_proto_rcv() function in net/tipc/link.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92976
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48760
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the usb_kill_urb() and usb_poison_urb() functions in drivers/usb/core/urb.c, within the __usb_hcd_giveback_urb() function in drivers/usb/core/hcd.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92899
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-48771
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the vmw_kms_helper_buffer_finish() function in drivers/gpu/drm/vmwgfx/vmwgfx_kms.c, within the vmw_fence_event_ioctl() function in drivers/gpu/drm/vmwgfx/vmwgfx_fence.c, within the vmw_execbuf_fence_commands(), vmw_execbuf_copy_fence_user() and vmw_execbuf_process() functions in drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU83116
Risk: Medium
CVSSv4.0: 6.7 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2023-24023
CWE-ID:
CWE-347 - Improper Verification of Cryptographic Signature
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a MitM attack.
The vulnerability exists due to improper verification of cryptographic signature in bluetooth implementation. A remote attacker with physical proximity to the system can perform MitM attack and potentially compromise the system.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU90064
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52707
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the psi_trigger_destroy() function in kernel/sched/psi.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90068
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52752
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the seq_printf() and spin_unlock() functions in fs/smb/client/cifs_debug.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89895
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-52881
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to an error within the tcp_ack() function in net/ipv4/tcp_input.c, which can result in system accepting ACK responses for bytes that were never sent. A remote attacker can perform spoofing attack.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91672
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26921
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer underflow within the nf_ct_frag6_queue() and nf_ct_frag6_gather() functions in net/ipv6/netfilter/nf_conntrack_reasm.c, within the ip_frag_queue() and ip_defrag() functions in net/ipv4/ip_fragment.c, within the FRAG_CB(), inet_frag_queue_insert(), inet_frag_reasm_prepare(), EXPORT_SYMBOL() and inet_frag_reasm_finish() functions in net/ipv4/inet_fragment.c. A local user can execute arbitrary code.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92035
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-26923
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper locking within the unix_gc() function in net/unix/garbage.c due to garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. A local user can execute arbitrary code with elevated privileges.
Update the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90167
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35789
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the ieee80211_change_station() function in net/mac80211/cfg.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90150
Risk: Medium
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-35861
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the cifs_signal_cifsd_for_reconnect() function in fs/smb/client/connect.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90152
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35862
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the smb2_is_network_name_deleted() function in fs/smb/client/smb2ops.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90149
Risk: Medium
CVSSv4.0: 4.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-35864
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error within the smb2_is_valid_lease_break() function in fs/smb/client/smb2misc.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90508
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35878
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the of_modalias() function in drivers/of/module.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92212
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-35950
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the drm_client_modeset_probe() function in drivers/gpu/drm/drm_client_modeset.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90735
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36894
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ffs_user_copy_worker() and ffs_epfile_async_io_complete() functions in drivers/usb/gadget/function/f_fs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90047
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36904
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the tcp_twsk_unique() function in net/ipv4/tcp_ipv4.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90885
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36940
CWE-ID:
CWE-415 - Double Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a double free error within the pinctrl_enable() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93734
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-36964
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to read and manipulate data.
The vulnerability exists due to improperly imposed permissions within the p9mode2perm() function in fs/9p/vfs_inode.c. A local user can read and manipulate data.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92376
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38541
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to memory corruption within the of_modalias() function in drivers/of/module.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92306
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38545
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the alloc_cqc(), free_cqc() and hns_roce_cq_event() functions in drivers/infiniband/hw/hns/hns_roce_cq.c. A local user can escalate privileges on the system.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92328
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38559
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the qedf_dbg_debug_cmd_write() function in drivers/scsi/qedf/qedf_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU92327
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38560
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the bfad_debugfs_write_regrd() and bfad_debugfs_write_regwr() functions in drivers/scsi/bfa/bfad_debugfs.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected package the Linux Kernel to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Live Patching: 15-SP2
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux: 15-SP2
SUSE Linux Enterprise High Availability Extension 15: SP2
SUSE Linux Enterprise Server for SAP Applications 15: SP2
SUSE Linux Enterprise Server 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise Server 15: SP2
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS: 15-SP2
SUSE Linux Enterprise High Performance Computing 15: SP2
SUSE Manager Server: 4.1
SUSE Manager Retail Branch Server: 4.1
SUSE Manager Proxy: 4.1
reiserfs-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
reiserfs-kmp-default: before 5.3.18-150200.24.197.1
kernel-docs: before 5.3.18-150200.24.197.1
kernel-devel: before 5.3.18-150200.24.197.1
kernel-source: before 5.3.18-150200.24.197.1
kernel-macros: before 5.3.18-150200.24.197.1
kernel-preempt-debugsource: before 5.3.18-150200.24.197.1
kernel-default-base: before 5.3.18-150200.24.197.1.150200.9.101.1
kernel-default-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build-debugsource: before 5.3.18-150200.24.197.1
kernel-preempt-devel-debuginfo: before 5.3.18-150200.24.197.1
kernel-obs-build: before 5.3.18-150200.24.197.1
kernel-preempt-debuginfo: before 5.3.18-150200.24.197.1
kernel-syms: before 5.3.18-150200.24.197.1
kernel-preempt-devel: before 5.3.18-150200.24.197.1
kernel-default-devel: before 5.3.18-150200.24.197.1
kernel-preempt: before 5.3.18-150200.24.197.1
dlm-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
gfs2-kmp-default: before 5.3.18-150200.24.197.1
gfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
cluster-md-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
dlm-kmp-default: before 5.3.18-150200.24.197.1
ocfs2-kmp-default-debuginfo: before 5.3.18-150200.24.197.1
ocfs2-kmp-default: before 5.3.18-150200.24.197.1
cluster-md-kmp-default: before 5.3.18-150200.24.197.1
kernel-default-livepatch-devel: before 5.3.18-150200.24.197.1
kernel-livepatch-5_3_18-150200_24_197-default-debuginfo: before 1-150200.5.3.1
kernel-default-livepatch: before 5.3.18-150200.24.197.1
kernel-default-debuginfo: before 5.3.18-150200.24.197.1
kernel-default-debugsource: before 5.3.18-150200.24.197.1
kernel-livepatch-SLE15-SP2_Update_50-debugsource: before 1-150200.5.3.1
kernel-livepatch-5_3_18-150200_24_197-default: before 1-150200.5.3.1
kernel-default: before 5.3.18-150200.24.197.1
CPE2.3https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.